Crosscheck mechanism to identify malicious nodes in ad hoc networks.
Xu SuRajendra V. BoppanaPublished in: Secur. Commun. Networks (2009)
Keyphrases
- ad hoc networks
- network nodes
- multipath routing
- malicious nodes
- network topology
- routing protocol
- routing algorithm
- wireless networks
- end to end
- wireless ad hoc networks
- peer to peer
- multiple paths
- quality of service
- key management
- end to end delay
- aodv routing protocol
- base station
- multi hop
- mobile nodes
- mobile ad hoc networks
- multipath
- wireless mesh networks
- wireless sensor networks
- wifi
- mobile networks
- real time
- data transmission
- wireless communication
- computer simulation
- sensor networks