Defense against Sybil attacks and authentication for anonymous location-based routing in MANET.
S. Vadhana KumariB. ParamasivanPublished in: Wirel. Networks (2017)
Keyphrases
- routing protocol
- mobile ad hoc networks
- secure routing
- ad hoc networks
- malicious nodes
- security mechanisms
- malicious users
- black hole attack
- wireless sensor networks
- routing algorithm
- semi fragile watermarking
- ddos attacks
- peer to peer
- network topology
- defense mechanisms
- trusted platform module
- node density
- digital watermarking
- multi hop
- network nodes
- detect malicious
- energy efficient
- energy consumption
- aodv routing protocol
- countermeasures
- routing scheme
- mobile nodes
- wireless ad hoc networks
- intrusion detection
- cross layer
- file sharing
- multipath routing
- network connectivity
- network security
- routing table
- multipath
- routing overhead
- biometric authentication
- mobile networks
- security issues
- security analysis
- user authentication
- security requirements
- electronic payment
- access control
- sensor networks
- mobile devices
- biometric template
- security protocols
- watermarking scheme
- spectrum sensing
- biometric data
- end to end delay
- authentication scheme
- adhoc network
- key distribution
- shortest path
- routing problem