Biodiversity: A security approach for ad hoc networks.
Jennifer T. JacksonSadie CreeseMark S. LeesonPublished in: CICS (2011)
Keyphrases
- ad hoc networks
- key management
- routing protocol
- network topology
- routing algorithm
- end to end
- identity based cryptography
- wireless ad hoc networks
- secure routing
- quality of service
- ns simulator
- wireless networks
- key management scheme
- wired networks
- group key agreement
- information security
- peer to peer
- security protocols
- end to end delay
- mobile networks
- multi hop
- security issues
- wireless mesh networks
- mobile wireless
- mobile nodes
- mac protocol
- intrusion detection
- qos routing
- mobile ad hoc networks
- key distribution
- security policies
- base station
- wireless sensor networks
- service differentiation
- resource constrained
- security requirements
- access control
- ad hoc networking
- neighboring nodes
- network nodes
- digital libraries