Resisting blackhole attacks on MANETs.
Mohamed A. AbdelshafyPeter J. B. KingPublished in: CCNC (2016)
Keyphrases
- watermarking algorithm
- mobile ad hoc networks
- countermeasures
- routing protocol
- multi hop
- image watermarking
- malicious attacks
- service discovery
- peer to peer
- watermarking scheme
- traffic analysis
- wavelet domain
- terrorist attacks
- security mechanisms
- security threats
- cyber attacks
- chosen plaintext
- digital watermarking
- signal processing
- dos attacks
- data dissemination
- computer security
- cryptographic protocols
- java card
- real time
- routing algorithm
- wireless sensor networks
- topology control
- neural network