Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks.
Farah I. KandahYashaswi SinghWeiyi ZhangPublished in: J. Commun. (2012)
Keyphrases
- wireless mesh networks
- key management scheme
- ad hoc networks
- key management
- mobile ad hoc networks
- channel assignment
- wireless networks
- routing protocol
- network topology
- routing algorithm
- wireless ad hoc networks
- secret key
- security protocols
- end to end
- multi hop
- quality of service
- wireless sensor networks
- key distribution
- base station
- peer to peer
- mesh network
- authentication protocol
- power supply
- wifi
- mobile networks
- data transmission
- low cost
- elliptic curve
- diffie hellman
- sensor networks