A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Mohammad S. ObaidatIsaac WoungangSanjay Kumar DhurandherVincent KooPublished in: Secur. Commun. Networks (2014)
Keyphrases
- mobile ad hoc networks
- black hole attack
- routing protocol
- cryptographic protocols
- ad hoc on demand distance vector
- route discovery
- network simulator
- multi hop
- ad hoc networks
- watermarking scheme
- adhoc network
- mobile nodes
- cross layer
- multipath
- network topology
- mobile networks
- network layer
- intermediate nodes
- security protocols
- authentication scheme
- topology control
- routing algorithm
- aodv routing protocol
- wireless sensor networks
- authentication protocol
- mobile devices
- end to end
- context aware