Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks.
Wei YuK. J. Ray LiuPublished in: IEEE Trans. Inf. Forensics Secur. (2007)
Keyphrases
- mobile ad hoc networks
- dos attacks
- ddos attacks
- multi hop
- traffic analysis
- network security
- routing protocol
- intermediate nodes
- ad hoc networks
- cross layer
- defense mechanisms
- network simulator
- limited bandwidth
- network layer
- mobile networks
- network topology
- mobile nodes
- topology control
- multipath
- network traffic
- network infrastructure
- network nodes
- sensor networks
- real time
- ip address
- aodv routing protocol
- network connectivity
- routing algorithm
- intrusion detection
- traffic flow
- mobile users
- computer networks
- wireless networks
- battery power