Secure cooperative mobile ad hoc networks against injecting traffic attacks.
Wei YuK. J. Ray LiuPublished in: SECON (2005)
Keyphrases
- mobile ad hoc networks
- secure routing
- routing protocol
- cooperative
- dos attacks
- ad hoc networks
- intermediate nodes
- network topology
- multi hop
- security protocols
- black hole
- key management
- aodv routing protocol
- network simulator
- cross layer
- wireless sensor networks
- security mechanisms
- routing algorithm
- network traffic
- traffic analysis
- traffic flow
- sensor networks
- cryptographic protocols
- mobile nodes
- routing scheme
- mobile networks
- multipath
- end to end
- topology control
- battery power
- peer to peer
- real time
- ddos attacks
- countermeasures
- quality of service
- wireless networks
- energy consumption
- stepping stones
- end to end delay
- energy efficiency
- base station
- social networks