Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks.
Weidong YangLimin SunZhenqiang XuPublished in: Int. J. Inf. Secur. Priv. (2015)
Keyphrases
- wireless networks
- authentication protocol
- cooperative
- low bandwidth
- security analysis
- power control
- smart card
- wireless local area network
- wireless communication
- lightweight
- public key
- multi hop
- base station
- mobile computing
- ad hoc networks
- network access
- secret key
- medium access control
- data transmission
- wifi
- security protocols
- cellular networks
- wireless systems
- packet scheduling
- mobile networks
- video delivery
- multimedia services
- physical layer
- wireless mesh networks
- rfid tags
- wired networks
- computer networks