An on-demand secure routing protocol resilient to byzantine failures.
Baruch AwerbuchDavid HolmerCristina Nita-RotaruHerbert RubensPublished in: Workshop on Wireless Security (2002)
Keyphrases
- routing protocol
- secure routing
- ad hoc networks
- network topology
- key management
- wireless sensor networks
- fault tolerant
- mobile ad hoc networks
- energy consumption
- routing algorithm
- data transmission
- energy aware
- energy efficient
- sensor networks
- multi hop
- link failure
- energy efficiency
- biological inspired
- security protocols
- routing overhead
- key management scheme
- routing scheme
- intermediate nodes
- end to end delay
- wireless ad hoc networks
- cloud computing
- mobile nodes
- security issues
- sensor nodes