On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications.
Christian TchepndaHassnaa MoustafaHouda LabiodGilles BourdonPublished in: Wirel. Pers. Commun. (2009)
Keyphrases
- multi hop
- security analysis
- wireless sensor networks
- ad hoc networks
- data transmission
- wireless mesh networks
- mobile ad hoc networks
- network connectivity
- wireless networks
- energy efficient
- routing protocol
- end to end
- base station
- communication networks
- routing algorithm
- network topology
- traffic flow
- energy consumption
- key distribution
- computer simulation
- context aware
- social networks