Security Analysis for P2P Routing Protocols.
Tatsuro FujiiYizhi RenYoshiaki HoriKouichi SakuraiPublished in: ARES (2009)
Keyphrases
- security analysis
- routing protocol
- ad hoc networks
- peer to peer
- network topology
- hop count
- wireless sensor networks
- routing algorithm
- smart card
- sensor networks
- energy consumption
- mobile ad hoc networks
- public key
- security requirements
- multi hop
- encryption scheme
- end to end delay
- data sharing
- mobile nodes
- packet delivery
- network security
- motion estimation
- image compression
- end to end
- digital libraries
- wireless ad hoc networks
- wireless mesh networks
- data sets