Multicast Steganography Using Routing Protocols.
Miralem MehicMiroslav VoznákPeppino FazioPublished in: MCSS (2017)
Keyphrases
- routing protocol
- routing algorithm
- route selection
- end to end delay
- multicast routing protocol
- routing scheme
- network layer
- ad hoc networks
- wireless sensor networks
- wireless ad hoc networks
- network topology
- mobile ad hoc networks
- energy consumption
- network coding
- packet delivery
- mac layer
- sensor networks
- data transmission
- multipath
- data hiding
- intermediate nodes
- multicast tree
- energy efficient
- multicast routing
- multi hop
- mobile nodes
- route planning
- cross layer
- wireless mesh networks
- link failure
- energy efficiency
- wireless networks
- secure routing
- network infrastructure
- mac protocol
- network simulator
- network resources
- obstacle avoidance
- base station
- shortest path