An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks.
David de AndrésJesus FriginalJuan-Carlos Ruiz-GarciaPedro J. GilPublished in: PRDC (2009)
Keyphrases
- ad hoc networks
- network topology
- end to end
- routing protocol
- routing algorithm
- wireless ad hoc networks
- wireless networks
- quality of service
- peer to peer
- key management
- multi hop
- mobile wireless
- end to end delay
- mobile ad hoc networks
- wireless sensor networks
- base station
- network infrastructure
- mac protocol
- mobile nodes
- wireless mesh networks
- mobile networks
- multipath routing
- wired networks
- secret key
- cellular networks
- propagation model
- qos routing