Throughput performance analysis of the wormhole and sybil attack in AODV.
Zolidah KasiranJuliza MohamadPublished in: DICTAP (2014)
Keyphrases
- ad hoc on demand distance vector
- black hole attack
- routing protocol
- data transmission
- ad hoc networks
- end to end delay
- mobile ad hoc networks
- wireless link
- routing algorithm
- malicious users
- network simulator
- adhoc network
- wireless sensor networks
- packet delivery ratio
- network topology
- detection mechanism
- average end to end delay
- malicious nodes
- sensor networks
- response time
- mac layer
- cross layer
- base station
- aodv routing protocol
- quality of service
- energy consumption
- data acquisition
- wireless ad hoc networks
- end to end
- packet loss
- higher throughput
- network layer
- routing overhead
- computer networks
- sensor nodes
- qos requirements
- file sharing
- key management
- mobile nodes
- multi hop
- cooperative