A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network.
Li-Joe LinShiuhpyng ShiehTzu-I YangWarren W. LinPublished in: SMC (2006)
Keyphrases
- ad hoc networks
- authentication scheme
- secret key
- key management
- routing algorithm
- routing protocol
- path selection
- wireless ad hoc networks
- network topology
- authentication protocol
- smart card
- multiple paths
- end to end
- link failure
- wireless networks
- quality of service
- mobile ad hoc networks
- multipath
- shortest path
- public key
- base station
- end to end delay
- peer to peer
- multi hop
- user authentication
- mobile nodes
- routing scheme
- multipath routing
- network nodes
- secure routing
- source node
- packet delivery
- wireless mesh networks
- routing problem
- energy consumption
- lightweight
- network infrastructure
- rfid tags
- mobile networks
- wireless communication
- routing overhead
- wireless sensor networks
- security analysis
- hash functions
- low cost