Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks.
Stefan K. StafraceNick AntonopoulosPublished in: Comput. Commun. (2010)
Keyphrases
- wireless ad hoc networks
- attack detection
- multistage
- end to end
- ad hoc networks
- intrusion detection system
- wireless networks
- multi hop
- multipath
- distributed computing
- routing protocol
- intrusion detection
- key management
- energy efficient
- cyber attacks
- product recommendation
- network topology
- data mining
- mobile ad hoc networks
- wireless channels
- anomaly detection
- wireless sensor networks