Security threats and solutions in MANETs: A case study using AODV and SAODV.
Jan von MulertIan WelchWinston Khoon Guan SeahPublished in: J. Netw. Comput. Appl. (2012)
Keyphrases
- security threats
- ad hoc networks
- routing protocol
- key management
- mobile ad hoc networks
- security issues
- security mechanisms
- routing algorithm
- wireless sensor networks
- wireless ad hoc networks
- network topology
- security risks
- multi hop
- energy consumption
- sensor networks
- mobile networks
- end to end
- data transmission
- sensitive data
- third party
- wireless networks
- end to end delay
- data sets