Exploiting simultaneous usage of different wireless interfaces for security and mobility.
Shlomi DolevIdan Heimlich ShtacherBracha ShapiraYuval EloviciGuy MessalemDudu MimranMarina KopeetskyPublished in: FGCT (2013)
Keyphrases
- mobile computing environment
- mobile networks
- mobile users
- mobile computing
- ad hoc networking
- mobile devices
- network connectivity
- wireless networks
- information security
- network security
- intrusion detection
- wireless communication
- physical layer
- access control
- statistical databases
- security issues
- user interface
- mobility management
- security mechanisms
- wireless local area network
- mobile ad hoc networks
- ubiquitous computing
- mobile agents
- aodv routing protocol
- network configuration
- information systems
- key management
- multi hop
- wifi
- security requirements
- power consumption