A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash.
Mohammed ErritaliOussama Mohamed RedaBouabid El OuahidiPublished in: CoRR (2011)
Keyphrases
- routing protocol
- secure routing
- ad hoc networks
- routing algorithm
- mobile ad hoc networks
- network topology
- key management
- wireless sensor networks
- advanced encryption standard
- energy consumption
- energy aware
- routing overhead
- end to end delay
- multi hop
- biological inspired
- wireless ad hoc networks
- routing scheme
- data transmission
- key management scheme
- sensor networks
- network layer
- intermediate nodes
- secret key
- intrusion detection
- cross layer
- multipath routing
- network traffic
- mobile networks
- anomaly detection
- network infrastructure
- hash functions
- packet delivery
- cooperative
- network routing
- source node
- key distribution
- mobile nodes
- sensor nodes
- intrusion detection system