Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Mike BurmesterTri Van LeAlec YasinsacPublished in: Ad Hoc Networks (2007)
Keyphrases
- ad hoc networks
- key management
- group key agreement
- ns simulator
- wired networks
- key distribution
- security protocols
- routing protocol
- network topology
- key establishment
- end to end
- wireless networks
- routing algorithm
- wireless ad hoc networks
- security services
- packet delivery
- identity based cryptography
- mac protocol
- multi hop
- peer to peer
- secure routing
- group communication
- quality of service
- mobile networks
- secure communication
- mobile ad hoc networks
- overlay network
- provably secure
- elliptic curve
- medium access
- network security
- network infrastructure
- security properties
- network nodes
- end to end delay
- authentication protocol
- application level
- pairwise
- mobile nodes
- multiple description coding
- scalable video
- security analysis
- intrusion detection
- wireless sensor networks
- cryptographic protocols
- qos routing
- key management scheme
- resource constrained
- security issues
- access control
- sensor networks