A secure technique for construction and maintenance of a trusted mobile backbone network in MANET.
Hosny M. IbrahimNagwa M. OmarEbram K. WilliamPublished in: ICNSC (2015)
Keyphrases
- wireless medium
- mobile users
- mobile ad hoc networks
- trusted computing
- network connectivity
- mobile phone
- mobile devices
- energy consumption
- mobile networks
- secure multi party
- software maintenance
- mobile computing
- security requirements
- security analysis
- mobile commerce
- mobile payment
- ad hoc networks
- mobile learning
- energy efficient
- multi hop
- mobile nodes
- key management
- fully distributed
- key management scheme
- factor authentication