A practical approach of ID-based cryptosystem in ad hoc networks.
Heeyoul KimJumin SongHyunsoo YoonPublished in: Wirel. Commun. Mob. Comput. (2007)
Keyphrases
- ad hoc networks
- key management
- key distribution
- elliptic curve
- symmetric key
- wireless ad hoc networks
- network topology
- bilinear pairings
- provably secure
- diffie hellman
- routing protocol
- private key
- routing algorithm
- end to end
- quality of service
- wireless networks
- signcryption scheme
- group communication
- digital signature
- mac protocol
- peer to peer
- multi hop
- secure communication
- mobile ad hoc networks
- secret sharing scheme
- end to end delay
- mobile wireless
- blind signature
- mobile networks
- propagation model
- blind signature scheme
- security protocols
- network nodes
- fault tolerant
- qos routing
- secret key
- wireless sensor networks
- wireless mesh networks