Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Chi LinGuowei WuKangbin YimLin YaoGang HouPublished in: IMIS (2015)
Keyphrases
- ad hoc networks
- connected dominating set
- dominating set
- network topology
- routing protocol
- end to end
- routing algorithm
- wireless networks
- quality of service
- wireless ad hoc networks
- peer to peer
- facility location problem
- mobile networks
- multi hop
- mac protocol
- mobile ad hoc networks
- base station
- end to end delay
- mobile wireless
- key management
- wired networks
- network infrastructure
- propagation model
- network nodes
- wireless mesh networks
- qos routing
- packet delivery
- information security