Keyphrases
- security model
- routing protocol
- mobile ad hoc networks
- ad hoc networks
- public key
- provably secure
- access control
- security analysis
- security requirements
- multi hop
- wireless sensor networks
- auto configuration
- designated verifier
- routing algorithm
- sensor networks
- energy efficiency
- energy consumption
- aodv routing protocol
- wireless networks
- mobile nodes
- multipath
- real time
- authentication and key agreement
- mobile networks
- security policies
- information security
- smart card
- peer to peer