Relying on time synchronization for security in ad hoc networks.
Donald J. ScottPublished in: ACM Southeast Regional Conference (2) (2005)
Keyphrases
- ad hoc networks
- key management
- network topology
- identity based cryptography
- routing protocol
- end to end
- ns simulator
- group key agreement
- routing algorithm
- wireless networks
- quality of service
- wireless ad hoc networks
- key management scheme
- secure routing
- multi hop
- peer to peer
- wired networks
- mobile wireless
- base station
- mobile networks
- key distribution
- mac protocol
- network infrastructure
- mobile ad hoc networks
- service differentiation
- security issues
- information security
- end to end delay
- security protocols
- packet delivery
- qos routing
- wireless sensor networks
- network nodes
- security policies
- network security
- intrusion detection
- real time
- propagation model
- group communication
- wireless mesh networks
- mobile nodes
- resource constrained
- key establishment
- ad hoc networking