Cross-layer security in two-hop wireless Gaussian relay network with untrusted relays.
Michal KaliszanJafar MohammadiSlawomir StanczakPublished in: ICC (2013)
Keyphrases
- cross layer
- wireless networks
- multi hop
- network layer
- mobile ad hoc networks
- transmission power
- link layer
- relay nodes
- routing protocol
- cellular networks
- physical layer
- medium access control
- multimedia services
- application layer
- multi layer
- base station
- video streaming
- wireless ad hoc networks
- mac layer
- quality of service
- wireless communication
- wireless link
- wireless sensor networks
- ad hoc networks
- scalable video
- network simulator
- access points
- mobile nodes
- security policies
- mobile networks
- power control
- wireless mesh networks
- data transmission
- wifi
- computer networks
- cognitive radio
- end to end
- energy efficient
- intrusion detection
- mac protocol
- qos requirements
- network resources
- energy consumption
- peer to peer
- routing algorithm
- low complexity
- network topology
- end to end delay
- key management
- real time