Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Heesook ChoiWilliam EnckJaesheung ShinPatrick D. McDanielThomas F. La PortaPublished in: MobiQuitous (2005)
Keyphrases
- traffic engineering
- network layer
- ip address
- intermediate nodes
- business intelligence
- data analysis
- network traffic
- security analysis
- end to end delay
- human activities
- network management
- security issues
- key management
- traffic congestion
- cross layer
- packet forwarding
- resource utilization
- mobile ad hoc networks
- traffic flow
- response time