Modelling Critical Node Attacks in MANETs.
Dongsheng ZhangJames P. G. SterbenzPublished in: IWSOS (2013)
Keyphrases
- intermediate nodes
- black hole
- cooperative
- malicious nodes
- topology control
- mobile ad hoc networks
- mobile nodes
- routing protocol
- ad hoc networks
- watermarking scheme
- service discovery
- countermeasures
- security protocols
- network nodes
- malicious users
- traffic analysis
- security threats
- ddos attacks
- graph structure
- directed graph
- wireless sensor networks
- data streams