Trust-based Security Protocol against blackhole attacks in opportunistic networks.
Sahil GuptaSanjay Kumar DhurandherIsaac WoungangArun KumarMohammad S. ObaidatPublished in: WiMob (2013)
Keyphrases
- security protocols
- cryptographic algorithms
- security services
- security mechanisms
- key management
- authentication protocol
- artificial immune algorithm
- cryptographic protocols
- rfid tags
- rfid systems
- social networks
- real time
- security requirements
- resource constrained
- trust model
- computer networks
- data processing
- wireless mesh networks
- database systems
- security measures