Modeling vulnerabilities of ad hoc routing protocols.
Shahan YangJohn S. BarasPublished in: SASN (2003)
Keyphrases
- routing protocol
- ad hoc networks
- mobile ad hoc networks
- network topology
- sensor networks
- multi hop
- wireless sensor networks
- energy consumption
- routing algorithm
- data delivery
- energy aware
- wireless ad hoc networks
- data transmission
- cross layer
- wireless networks
- secure routing
- cooperative
- sensor nodes
- end to end delay
- cloud computing
- neighboring nodes
- routing scheme
- biological inspired