Identity based secure AODV and TCP for mobile ad hoc networks.
Uttam GhoshRaja DattaPublished in: ACWR (2011)
Keyphrases
- key management
- ad hoc networks
- routing protocol
- end to end
- key distribution
- wireless sensor networks
- wireless ad hoc networks
- ns simulator
- mac layer
- routing algorithm
- mobile ad hoc networks
- key management scheme
- encryption scheme
- network layer
- data transmission
- cross layer
- multi hop
- end to end delay
- secure communication
- security protocols
- security services
- wireless link
- group communication
- digital signature
- provably secure
- secret sharing scheme
- congestion control
- sensor networks
- wireless networks
- mac protocol
- signcryption scheme
- authentication and key agreement
- elliptic curve
- resource constrained
- signature scheme
- diffie hellman
- base station
- mobile nodes
- multipath
- identity based encryption
- private key
- security properties
- standard model
- video streaming
- energy consumption
- quality of service
- real time