How to Bootstrap Security for Ad-Hoc Network: Revisited.
Wook ShinCarl A. GunterShinsaku KiyomotoKazuhide FukushimaToshiaki TanakaPublished in: SEC (2009)
Keyphrases
- ad hoc networks
- key management
- secure routing
- wireless ad hoc networks
- routing protocol
- network topology
- identity based cryptography
- ns simulator
- wireless networks
- routing algorithm
- secure communication
- quality of service
- end to end
- mobile ad hoc networks
- mobile wireless
- intrusion detection
- limited bandwidth
- propagation model
- mac protocol
- trust relationships
- mobile nodes
- multi hop
- base station
- security protocols
- network nodes
- end to end delay
- neighboring nodes
- service differentiation
- access control
- wireless mesh networks
- network security
- peer to peer
- real time
- mobile networks
- security policies
- aodv routing protocol
- mobile devices