Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Wenjia LiAnupam JoshiTim FininPublished in: CSE (3) (2009)
Keyphrases
- ad hoc networks
- network topology
- wireless ad hoc networks
- wireless networks
- routing protocol
- end to end
- routing algorithm
- mobile ad hoc networks
- peer to peer
- key management
- multi hop
- base station
- quality of service
- network nodes
- end to end delay
- mobile networks
- mac protocol
- mobile nodes
- anomaly detection
- mobile wireless
- neighboring nodes
- service differentiation
- packet forwarding
- multipath routing
- network infrastructure
- wireless mesh networks
- pairwise
- power consumption