Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks.
Waqas BukshYing GuoSaleem IqbalKashif Naseer QureshiJaime LloretPublished in: Trans. Emerg. Telecommun. Technol. (2024)
Keyphrases
- ad hoc networks
- malicious nodes
- network nodes
- multipath routing
- reputation information
- routing protocol
- wireless sensor networks
- network topology
- wireless ad hoc networks
- routing algorithm
- end to end
- wireless networks
- mobile ad hoc networks
- neighboring nodes
- quality of service
- key management
- peer to peer
- multi hop
- computer networks
- base station
- end to end delay
- aodv routing protocol
- real time
- wireless mesh networks
- mobile networks
- network topologies
- sensor networks
- multiple paths
- trust model
- multipath
- communication networks
- energy consumption