Security for cluster based ad hoc networks.
Vijay VaradharajanRajan ShankaranMichael HitchensPublished in: Comput. Commun. (2004)
Keyphrases
- ad hoc networks
- key management
- network topology
- end to end
- identity based cryptography
- wireless ad hoc networks
- wireless networks
- routing protocol
- quality of service
- group key agreement
- routing algorithm
- secure routing
- key management scheme
- wired networks
- mobile wireless
- multi hop
- peer to peer
- end to end delay
- base station
- mac protocol
- ns simulator
- wireless mesh networks
- key distribution
- security protocols
- mobile ad hoc networks
- information security
- mobile networks
- mobile nodes
- network infrastructure
- group communication
- service differentiation
- access control
- intrusion detection
- security issues
- network nodes
- security requirements
- wireless sensor networks
- elliptic curve
- key establishment
- network security
- qos routing
- neighboring nodes
- propagation model
- mobile devices