Login / Signup
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks.
Ismail Hababeh
Issa Khalil
Abdallah Khreishah
Samir Bataineh
Published in:
J. Comput. Sci. (2013)
Keyphrases
</>
ad hoc networks
key management
network topology
wireless networks
routing algorithm
data sets
routing protocol
mobile ad hoc networks
secure routing
mobile wireless
information security
end to end
peer to peer
wireless ad hoc networks
mac protocol
quality of service
network security
network traffic
multi hop