Identity certified authentication for ad-hoc networks.
André WeimerskirchDirk WesthoffPublished in: SASN (2003)
Keyphrases
- ad hoc networks
- identity management
- network topology
- wireless ad hoc networks
- secure communication
- routing protocol
- end to end
- wireless networks
- biometric data
- key management
- routing algorithm
- quality of service
- identity based cryptography
- trust relationships
- key distribution
- peer to peer
- multi hop
- end to end delay
- mobile networks
- access control
- base station
- personal information
- mac protocol
- mobile ad hoc networks
- mobile wireless
- wired networks
- mobile nodes
- network infrastructure
- real time
- propagation model
- security mechanisms
- neighboring nodes
- resource constrained
- qos routing
- cloud computing
- sensor networks