Login / Signup
Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack.
Jing-Jing Gui
Jinshuang Wang
Yu-sen Zhang
Tao Zhang
Published in:
Intell. Autom. Soft Comput. (2011)
Keyphrases
</>
routing protocol
network topology
wireless sensor networks
sensor networks
ad hoc networks
routing algorithm
data streams
energy consumption
data acquisition
mobile ad hoc networks
network layer