Recommendation Trust for Improved Malicious Node Detection in Ad Hoc Networks.
Saneeha AhmedKemal TepePublished in: VTC Fall (2017)
Keyphrases
- ad hoc networks
- neighboring nodes
- network nodes
- malicious nodes
- wireless networks
- network topology
- routing protocol
- end to end
- mobile nodes
- wireless ad hoc networks
- routing algorithm
- trust relationships
- topology control
- quality of service
- key management
- mac protocol
- mobile ad hoc networks
- aodv routing protocol
- base station
- multi hop
- mobile networks
- peer to peer
- multipath routing
- computer networks
- link failure
- wireless sensor networks
- wireless mesh networks
- recommender systems
- node mobility
- energy consumption
- anomaly detection
- transmission range
- data sets