Secure dominating set-based routing protocol in MANET: Using reputation.
Amin MohajerMaryam BavagharRashin SaboorAli PayandehPublished in: ISCISC (2013)
Keyphrases
- information security
- routing protocol
- dominating set
- security issues
- secure routing
- mobile ad hoc networks
- facility location problem
- ad hoc networks
- wireless sensor networks
- routing algorithm
- network topology
- energy consumption
- data transmission
- key management
- multi hop
- cross layer
- sensor networks
- key management scheme
- facility location
- network layer
- energy aware
- wireless ad hoc networks
- energy efficient
- end to end delay
- energy efficiency
- routing scheme
- intermediate nodes
- computational complexity
- approximation algorithms
- end to end
- mobile nodes
- sensor nodes