A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Isaac WoungangMohammad S. ObaidatSanjay Kumar DhurandherIssa TraoréPublished in: CITS (2013)
Keyphrases
- mobile ad hoc networks
- routing protocol
- black hole attack
- ad hoc networks
- multi hop
- multipath
- network topology
- network simulator
- cross layer
- topology control
- mobile networks
- aodv routing protocol
- routing algorithm
- real time
- ad hoc on demand distance vector
- wireless ad hoc networks
- network nodes
- intermediate nodes
- wireless sensor networks
- mobile nodes
- multimedia
- energy efficiency
- anomaly detection
- sensor networks