Mobility helps security in ad hoc networks.
Srdjan CapkunJean-Pierre HubauxLevente ButtyánPublished in: MobiHoc (2003)
Keyphrases
- ad hoc networks
- ns simulator
- key management
- mobile networks
- routing protocol
- network topology
- wireless ad hoc networks
- ad hoc networking
- wireless networks
- routing algorithm
- identity based cryptography
- end to end
- base station
- aodv routing protocol
- quality of service
- mobile ad hoc networks
- group key agreement
- end to end delay
- secure routing
- node mobility
- mac protocol
- wired networks
- key management scheme
- multi hop
- intrusion detection
- mobile wireless
- peer to peer
- network security
- real time
- data transmission
- service differentiation
- mobile nodes
- cellular networks
- wireless mesh networks
- wireless sensor networks
- ubiquitous computing
- information security
- data streams
- medium access
- mobile users
- security policies
- ip networks