Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks.
Keun-Ho LeeSang-Bum HanHeyi-Sook SuhChong-Sun HwangSangKeun LeePublished in: J. Inf. Sci. Eng. (2007)
Keyphrases
- ad hoc networks
- authentication protocol
- security protocols
- key management
- routing protocol
- smart card
- wireless networks
- end to end
- wireless ad hoc networks
- routing algorithm
- quality of service
- lightweight
- public key
- rfid tags
- security analysis
- peer to peer
- mobile ad hoc networks
- base station
- wireless sensor networks
- secret key
- key distribution
- metadata