Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure.
E. A. Mary AnitaV. VasudevanPublished in: Inf. Secur. J. A Glob. Perspect. (2009)
Keyphrases
- routing protocol
- black hole attack
- routing algorithm
- routing scheme
- end to end delay
- network layer
- ad hoc networks
- wireless ad hoc networks
- adhoc network
- mobile ad hoc networks
- public key
- wireless sensor networks
- network topology
- ad hoc on demand distance vector
- network coding
- packet delivery ratio
- data transmission
- sensor networks
- multi hop
- multipath
- packet delivery
- energy consumption
- security mechanisms
- cross layer
- routing problem
- mobile nodes
- network resources
- intermediate nodes
- application layer
- wireless networks
- key management scheme
- response time
- end to end
- network simulator
- mac protocol