Applying Forward Security and Threshold Cryptography in Ad Hoc Networks.
H. W. GoY. DongLucas Chi Kwong HuiSiu-Ming YiuVictor O. K. LiPublished in: International Conference on Wireless Networks (2004)
Keyphrases
- ad hoc networks
- key management
- symmetric key
- information security
- routing protocol
- end to end
- network topology
- identity based cryptography
- wireless ad hoc networks
- wireless networks
- wired networks
- ns simulator
- key management scheme
- secure communication
- routing algorithm
- group key agreement
- signcryption scheme
- quality of service
- secure routing
- mac protocol
- multi hop
- key distribution
- mobile ad hoc networks
- base station
- network security
- intrusion detection
- end to end delay
- mobile networks
- security protocols
- peer to peer
- mobile wireless
- security requirements
- service differentiation
- resource constrained
- access control
- security issues
- qos routing
- wireless sensor networks
- public key cryptography
- security policies
- group communication
- network nodes
- wireless mesh networks
- digital signature
- elliptic curve
- neighboring nodes
- multiple paths
- multipath routing
- provably secure
- key establishment
- network management