Security bootstrapping of mobile ad hoc networks using identity-based cryptography.
Kamal Adli MehrJavad Musevi NiyaPublished in: Secur. Commun. Networks (2016)
Keyphrases
- identity based cryptography
- mobile ad hoc networks
- ad hoc networks
- key management
- routing protocol
- network topology
- multi hop
- wireless networks
- quality of service
- mobile nodes
- routing algorithm
- end to end
- multipath
- base station
- digital signature
- security protocols
- key distribution
- mobile networks
- wireless sensor networks
- peer to peer
- secure communication
- sensor networks
- energy consumption
- provably secure