An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network.
DeepaJayashree AgarkhedPublished in: FICTA (2) (2016)
Keyphrases
- mobile ad hoc networks
- routing protocol
- multi hop
- ad hoc networks
- multipath
- black hole attack
- network topology
- network simulator
- routing algorithm
- mobile networks
- cooperative
- data transmission
- mobile nodes
- cross layer
- network infrastructure
- energy consumption
- key management scheme
- ad hoc on demand distance vector
- wireless sensor networks