Performance of a Jini-based Ad Hoc Network Authentication Scheme.
M. M. McMahonD. M. NeedhamJ. B. DatkoPublished in: PDCS (2003)
Keyphrases
- authentication scheme
- ad hoc networks
- key management
- network topology
- end to end
- routing protocol
- wireless ad hoc networks
- wireless networks
- routing algorithm
- smart card
- user authentication
- mobile ad hoc networks
- quality of service
- public key
- secret key
- peer to peer
- mobile networks
- authentication protocol
- secure communication
- multi hop
- mobile nodes
- service differentiation
- security analysis
- end to end delay
- packet delivery
- security mechanisms
- propagation model
- secure routing
- network nodes
- wireless mesh networks
- security protocols
- access control