Keyphrases
- secret key
- session key
- key distribution
- authentication protocol
- routing protocol
- ad hoc networks
- mobile ad hoc networks
- mutual authentication
- authentication scheme
- smart card
- key management
- diffie hellman
- secure communication
- key agreement protocol
- public key
- routing algorithm
- private key
- wireless ad hoc networks
- ad hoc on demand distance vector
- multi hop
- user authentication
- network topology
- wireless sensor networks
- cryptographic protocols
- end to end delay
- ns simulator
- rfid tags
- fuzzy vault
- authentication mechanism
- network layer
- security services
- security mechanisms
- energy efficiency
- information security
- end to end
- energy consumption
- trusted third party
- sensor networks
- wireless networks
- packet delivery
- wired networks
- elliptic curve cryptography
- quality of service
- security protocols
- data transmission
- intermediate nodes
- node mobility
- mobile networks
- peer to peer
- security analysis