Efficient security mechanisms for the border gateway routing protocol.
Bradley R. SmithJ. J. Garcia-Luna-AcevesPublished in: Comput. Commun. (1998)
Keyphrases
- routing protocol
- security mechanisms
- resource constrained
- wireless sensor networks
- routing algorithm
- sensor networks
- mobile ad hoc networks
- multi path routing
- ad hoc networks
- energy consumption
- wireless ad hoc networks
- network topology
- data transmission
- multi hop
- data mining
- security issues
- access control
- data centric
- end to end delay
- energy aware
- aodv routing protocol
- peer to peer
- intermediate nodes