Improving performance overhead of a trust-clustering key management protocol in ad hoc networks.
Mustapha SadiMourad AmadNadjib BadachePublished in: Int. J. Electron. Secur. Digit. Forensics (2020)
Keyphrases
- key management
- ad hoc networks
- group key agreement
- security services
- key distribution
- provably secure
- security protocols
- group communication
- mac protocol
- network topology
- key management scheme
- wireless ad hoc networks
- routing protocol
- end to end
- elliptic curve
- digital signature
- neighboring nodes
- wireless sensor networks
- key establishment
- mobile nodes
- symmetric key
- routing algorithm
- wireless networks
- secure communication
- resource constrained
- multi hop
- quality of service
- mobile networks
- identity based cryptography
- peer to peer
- wireless mesh networks
- base station
- mobile ad hoc networks
- authentication protocol
- network nodes
- signcryption scheme
- bilinear pairings
- aodv routing protocol