Securing RPL routing protocol from blackhole attacks using a trust-based mechanism.
David AirehrourJairo A. GutiérrezSayan Kumar RayPublished in: ITNAC (2016)
Keyphrases
- routing protocol
- secure routing
- ad hoc networks
- routing algorithm
- wireless sensor networks
- network topology
- energy aware
- mobile ad hoc networks
- data transmission
- hop count
- wireless ad hoc networks
- energy consumption
- aodv routing protocol
- energy efficiency
- energy efficient
- multi hop
- end to end delay
- sensor networks
- network layer
- route discovery
- biological inspired
- black hole attack
- cross layer
- sensor nodes
- intermediate nodes
- network nodes
- mobile nodes
- base station
- wireless networks
- peer to peer