An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation.
Edith C. H. NgaiMichael R. LyuPublished in: SUTC (1) (2006)
Keyphrases
- security services
- security mechanisms
- key management
- trust relationships
- authentication mechanism
- security protocols
- public key infrastructure
- security requirements
- trust negotiation
- clustering algorithm
- public key cryptography
- service providers
- clustering method
- authentication protocol
- security analysis
- identity management
- integrity verification
- identity authentication
- data encryption
- personal information
- web services
- k means
- intrusion detection
- trusted third party
- trust model
- service quality
- security systems
- network access
- information security
- user authentication
- fuzzy vault
- security issues
- security management
- authentication scheme
- access control
- trust management