Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA.
István VajdaPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- routing protocol
- network layer
- ad hoc networks
- secure routing
- routing algorithm
- network topology
- wireless sensor networks
- key management
- mobile ad hoc networks
- energy consumption
- adhoc network
- ns simulator
- energy aware
- source node
- information security
- data transmission
- biological inspired
- cross layer
- sensor networks
- multi hop
- security issues
- energy efficient
- black hole attack
- intrusion detection
- ad hoc networking
- network security
- energy efficiency
- intermediate nodes
- cloud computing
- physical layer
- security policies
- routing overhead
- end to end delay
- cooperative
- base station
- key management scheme
- end to end
- wireless mesh networks
- security protocols
- mobile nodes