Keyphrases
- ad hoc networks
- key management
- identity based cryptography
- network topology
- routing algorithm
- end to end
- routing protocol
- wireless ad hoc networks
- wireless networks
- group key agreement
- ns simulator
- key management scheme
- multi hop
- mobile wireless
- base station
- mobile ad hoc networks
- wired networks
- secure routing
- information security
- peer to peer
- quality of service
- mobile networks
- security issues
- access control
- security protocols
- security requirements
- network security
- security policies
- wireless sensor networks
- ambient intelligence
- end to end delay
- data transmission
- mac protocol
- network infrastructure
- mobile nodes
- network nodes
- wireless mesh networks
- multiple paths
- neighboring nodes
- intrusion detection
- qos routing
- security analysis
- sensor networks
- real time
- digital libraries
- multimedia