Routing for security in networks with adversarial nodes.
Pak Hou CheMinghua ChenTracey HoSidharth JaggiMichael LangbergPublished in: NetCod (2013)
Keyphrases
- network nodes
- network topologies
- malicious nodes
- wireless ad hoc networks
- network structure
- mobile nodes
- node density
- network layer
- shortest path
- ad hoc networks
- network topology
- link failure
- neighboring nodes
- secure routing
- destination node
- computer networks
- interconnection networks
- key management
- routing protocol
- mobile ad hoc networks
- real world networks
- multipath routing
- small world
- inter domain
- information security
- mobile networks
- traffic engineering
- packet delivery
- network security
- fully connected
- source node
- access control
- multi agent
- end to end
- missing links
- network coding
- overlapping communities
- dynamic routing
- security issues
- routing problem
- path length
- network management
- ip addresses
- network design
- edge weights
- multi hop
- packet forwarding
- complex networks
- information networks
- centrality measures
- intermediate nodes
- black hole
- multipath
- communication networks
- end to end delay