Circumventing sinkhole attack in ad hoc networks.
Khurram Gulzar RanaYongquan CaiAllah DittaMuhammad AzeemMuhammad QasimPublished in: Int. J. Wirel. Mob. Comput. (2015)
Keyphrases
- ad hoc networks
- network topology
- routing protocol
- routing algorithm
- end to end
- wireless networks
- quality of service
- wireless ad hoc networks
- peer to peer
- key management
- mobile ad hoc networks
- multi hop
- network nodes
- mac protocol
- mobile networks
- base station
- end to end delay
- mobile wireless
- wired networks
- network infrastructure
- ddos attacks
- neighboring nodes
- qos routing
- wireless mesh networks