Login / Signup
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Loukas Lazos
Radha Poovendran
Catherine A. Meadows
Paul F. Syverson
LiWu Chang
Published in:
WCNC (2005)
Keyphrases
</>
wireless ad hoc networks
end to end
ad hoc networks
multi hop
wireless networks
distributed computing
mobile ad hoc networks
multipath
key management
routing protocol
security protocols
wireless communication
routing algorithm
wifi
quality of service
security mechanisms
wireless channels
cloud computing