Treatment of Reactive Routing Protocols Using Second Chance Based On Malicious Behavior of Nodes in MANETS.
Mohammad Riyaz BelgaumSafeeullah SoomroZainab AlansariMuhammad AlamPublished in: CoRR (2017)
Keyphrases
- routing protocol
- malicious behavior
- intermediate nodes
- mobile nodes
- malicious nodes
- wireless sensor networks
- ad hoc networks
- mobile ad hoc networks
- neighboring nodes
- network nodes
- wireless ad hoc networks
- sensor nodes
- packet delivery
- network topology
- routing algorithm
- multi hop
- routing overhead
- source node
- sensor networks
- secure routing
- data transmission
- aodv routing protocol
- energy consumption
- energy efficient
- topology control
- wireless mesh networks
- end to end delay
- node mobility
- energy efficiency
- hop count
- route discovery
- wireless networks
- ad hoc on demand distance vector
- multicast routing protocol
- base station
- routing scheme
- directed graph