A double authentication scheme to detect impersonation attack in link state routing protocols.
Dijiang HuangAmit SinhaDeep MedhiPublished in: ICC (2003)
Keyphrases
- authentication scheme
- routing protocol
- authentication protocol
- smart card
- secret key
- security analysis
- ad hoc networks
- communication links
- wireless sensor networks
- user authentication
- network topology
- routing algorithm
- energy consumption
- public key
- mobile ad hoc networks
- end to end delay
- sensor networks
- multi hop
- data transmission
- error correction
- shortest path
- lightweight