Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking.
Wissam MallouliBachar WehbiAna R. CavalliPublished in: ADHOC-NOW (2008)
Keyphrases
- ad hoc networks
- key management
- peer to peer
- network nodes
- network topology
- wireless networks
- wireless ad hoc networks
- end to end
- routing protocol
- identity based cryptography
- routing algorithm
- quality of service
- group communication
- wired networks
- group key agreement
- key management scheme
- multi hop
- mobile wireless
- ns simulator
- distributed environment
- distributed systems
- mac protocol
- secure routing
- mobile ad hoc networks
- real time
- end to end delay
- mobile networks
- access control
- intrusion detection
- base station
- malicious nodes
- information security
- security issues
- wireless mesh networks
- neighboring nodes
- security policies
- security protocols
- network security
- key distribution
- network topologies
- elliptic curve
- mobile nodes
- security requirements
- digital libraries