Authentication in very large ad hoc networks using randomized groups.
Yong LeeZygmunt J. HaasPublished in: PIMRC (2005)
Keyphrases
- ad hoc networks
- network topology
- routing protocol
- end to end
- wireless networks
- routing algorithm
- wireless ad hoc networks
- secure communication
- quality of service
- key management
- peer to peer
- mobile wireless
- mac protocol
- identity based cryptography
- mobile ad hoc networks
- base station
- end to end delay
- multi hop
- mobile networks
- service differentiation
- network infrastructure
- wired networks
- wireless mesh networks
- data sets
- mobile nodes
- multipath routing
- real time video
- propagation model
- neighboring nodes