A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc Networks.
Meng-Yen HsiehYueh-Min HuangPublished in: NPC (2005)
Keyphrases
- ad hoc networks
- key management
- secure communication
- peer to peer
- network nodes
- key distribution
- secure routing
- routing protocol
- network topology
- routing algorithm
- rights management
- wireless ad hoc networks
- security services
- group key agreement
- wireless networks
- end to end
- symmetric key
- group communication
- identity based cryptography
- key management scheme
- quality of service
- mobile ad hoc networks
- qos routing
- mac protocol
- security mechanisms
- security analysis
- distributed systems
- base station
- authentication protocol
- end to end delay
- routing scheme
- mobile wireless
- multi hop
- provably secure
- data transmission
- security requirements
- security issues
- public key cryptography
- mobile agents
- smart card
- key establishment
- computer networks
- wireless sensor networks
- diffie hellman
- fault tolerant
- multipath
- distributed computing
- digital signature
- elliptic curve
- security protocols
- mobile networks
- packet delivery
- service differentiation
- routing overhead
- cloud computing
- response time
- web services