Editorial for special issue on privacy and security in wireless sensorand ad hoc networks.
Wensheng ZhangSencun ZhuGuohong CaoPublished in: Ad Hoc Networks (2009)
Keyphrases
- special issue
- ad hoc networks
- wireless networks
- key management
- wired networks
- multi hop
- security issues
- security services
- mobile ad hoc networks
- mac protocol
- mobile networks
- ad hoc networking
- limited bandwidth
- wifi
- mobile wireless
- routing protocol
- wireless ad hoc networks
- end to end
- physical layer
- wireless communication
- wireless mesh networks
- mobile nodes
- routing algorithm
- network infrastructure
- security mechanisms
- information security
- data security
- international journal
- security properties
- sensitive data
- personal data
- ai edam
- privacy concerns
- peer to peer
- quality of service
- key management scheme
- security protocols
- ecml pkdd
- authentication protocol
- base station
- privacy preserving
- data privacy
- end to end delay
- security requirements
- network security
- applied intelligence
- wireless sensor networks
- cellular networks
- intrusion detection
- cloud computing
- multipath routing
- security analysis
- node mobility
- sensitive information
- network nodes
- wireless link
- personal information
- access control