The Keying and Authentication for Routing Protocol (KARP) IS-IS Security Analysis.
Uma ChunduriAlbert TianWenhu LuPublished in: RFC (2015)
Keyphrases
- security analysis
- routing protocol
- ad hoc networks
- user authentication
- authentication protocol
- wireless sensor networks
- routing algorithm
- smart card
- security requirements
- mobile ad hoc networks
- mutual authentication
- authentication scheme
- public key
- energy consumption
- encryption scheme
- sensor networks
- wireless ad hoc networks
- image compression
- mobile nodes
- lightweight
- private key
- cooperative
- real time