Fully self-organized peer-to-peer key management for mobile ad hoc networks.
Johann van der MerweDawoud S. DawoudStephen McDonaldPublished in: Workshop on Wireless Security (2005)
Keyphrases
- key management
- peer to peer
- ad hoc networks
- routing protocol
- key management scheme
- security threats
- resource constrained
- routing algorithm
- secret sharing scheme
- network topology
- wireless sensor networks
- key distribution
- group communication
- load balancing
- security protocols
- security services
- secure communication
- mobile ad hoc networks
- digital signature
- provably secure
- digital libraries
- secret key
- fault tolerance
- file sharing
- elliptic curve
- identity based cryptography
- distributed computing
- data sharing
- mobile networks
- multipath
- low cost
- sensor networks
- real time
- key establishment