Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Chun-Ta LiMin-Shiang HwangYen-Ping ChuPublished in: Comput. Syst. Sci. Eng. (2008)
Keyphrases
- key exchange
- ad hoc networks
- routing protocol
- secure communication
- key management
- diffie hellman
- key distribution
- key exchange protocol
- digital signature
- network topology
- routing algorithm
- mobile ad hoc networks
- wireless sensor networks
- peer to peer
- wireless ad hoc networks
- password based authenticated key exchange
- security analysis
- data transmission
- multi hop
- secure routing
- key management scheme
- elliptic curve
- group communication
- energy consumption
- sensor networks
- base station
- mac protocol
- mobile nodes
- energy efficiency
- quality of service
- end to end delay
- private key
- wireless networks
- mobile networks
- security protocols
- end to end
- security requirements
- network nodes
- fault tolerance
- packet delivery
- ns simulator
- resource constrained
- security properties
- wireless mesh networks
- access control
- aodv routing protocol