![Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing](https://www.pdfsearch.io/img/0f51b05de5c6ae3dfdfc61efef32f8ff.jpg)
| Document Date: 2011-11-09 13:25:59 Open Document File Size: 289,75 KBShare Result on Facebook
City RREQ / / Company Ad Hoc Networks / Kun Sun Cyber Defense Laboratory / / / Event FDA Phase / / Facility North Carolina State University / / IndustryTerm on-demand routing protocol / mobile ad-hoc networks / secure and efficient routing protocols / wireless ad-hoc network / secure ad-hoc routing protocols / vulnerability analysis tools / stateless protocol / security services / less powerful computing resources / tamper-proof hardware / mobile ad-hoc routing protocols / wireless communication / ad-hoc routing protocols / typical mobile ad-hoc network / ad-hoc network / be derived automatically using vulnerability analysis tools / / Organization Army Research Office / North Carolina State University / Raleigh / RREQ MF / / Position forward / or actively forge RREQ messages / Forward / / Product Some compound / AODV / / ProgrammingLanguage Hoc / / ProvinceOrState North Carolina / / Technology cryptography / routing protocol / AODV protocol / mobile ad-hoc routing protocols / stateless protocol / The AODV Protocol The AODV protocol / secure ad-hoc routing protocols / simulation / IPsec Authentication Header protocol / on-demand routing protocol / ad-hoc routing protocols / /
SocialTag |