Routing security scheme based on reputation evaluation in hierarchical ad hoc networks.
Yao YuLei GuoXingwei WangCuixiang LiuPublished in: Comput. Networks (2010)
Keyphrases
- ad hoc networks
- key management
- key management scheme
- routing protocol
- identity based cryptography
- routing scheme
- ns simulator
- routing algorithm
- trust relationships
- network topology
- wireless ad hoc networks
- wireless mesh networks
- key distribution
- wireless networks
- end to end
- mobile nodes
- quality of service
- provably secure
- multi hop
- mobile ad hoc networks
- secure routing
- end to end delay
- peer to peer
- packet delivery ratio
- qos routing
- mac protocol
- mobile wireless
- aodv routing protocol
- mobile networks
- elliptic curve
- base station
- wireless sensor networks
- packet delivery
- key establishment
- security protocols
- network nodes
- multipath routing
- network layer
- network infrastructure
- security analysis
- diffie hellman