Trust based flooding attack detection and response mechanisms for ad hoc on-demand distance vector routing protocol
Mobile Ad hoc Networks provide a structure-less environment, enabling participants in the coverage mobile nodes to communicate each other without using any centralized authentication agent. Thus, it is compromised in face to various sorts of attacks. Unfortunately, none of the presented secured rout...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/38182/1/BahramYaghoubzadehMFSKSM2013.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!