End to End Security and Path Security in Network Mobility.
Long-Sheng LiShr-Shiuan TzengRui-Chung BaiMeng-Tai LiPublished in: ICPP Workshops (2011)
Keyphrases
- end to end
- ad hoc networks
- ns simulator
- wireless ad hoc networks
- internet protocol
- congestion control
- network management
- high bandwidth
- information security
- multipath
- rate adaptation
- admission control
- network security
- intrusion detection
- real world
- mobile networks
- mobile agents
- transport layer
- computer networks
- rate allocation
- network structure
- peer to peer
- packet loss rate
- wireless sensor networks
- communication networks
- content delivery
- smart card
- routing protocol
- network monitoring