Is Really NACK Protocol Secure to Be Employed in MANETs?
Maryam SaeedAli MackvandiMehdi TaghaviMohammad Zare BidokiMehdi GhasemiAli NeshatiPublished in: CSE (2014)
Keyphrases
- wireless medium
- cryptographic protocols
- secure routing
- covert channel
- authentication protocol
- routing protocol
- security protocols
- lightweight
- scalar product
- key distribution
- security analysis
- ad hoc networks
- group communication
- multicast routing protocol
- key agreement protocol
- key exchange protocol
- security properties
- provably secure
- data dissemination
- diffie hellman
- mutual authentication
- security model
- multi party
- secure multi party
- rfid systems
- secure communication
- key establishment
- secure multiparty computation
- password authentication
- mobile agent system
- key management
- mobile ad hoc networks
- mobile nodes
- security requirements
- security services
- trusted third party
- multi hop
- peer to peer
- energy consumption
- smart card
- network topology
- rfid tags
- route discovery
- electronic voting
- digital signature
- blind signature
- wireless sensor networks
- end to end delay
- user privacy