How secure are secure interdomain routing protocols?
Sharon GoldbergMichael SchapiraPeter HummonJennifer RexfordPublished in: Comput. Networks (2014)
Keyphrases
- secure routing
- routing protocol
- ad hoc networks
- key management
- wireless sensor networks
- network topology
- routing algorithm
- security issues
- sensor networks
- energy consumption
- data transmission
- mobile ad hoc networks
- wireless ad hoc networks
- security mechanisms
- security protocols
- cross layer
- intermediate nodes
- key management scheme
- data sets