A Novel Authentication and Security Protocol for Wireless Adhoc Networks.
Umair AminMunam Ali ShahPublished in: ICAC (2018)
Keyphrases
- security protocols
- authentication protocol
- security services
- security mechanisms
- wireless local area network
- wireless mesh networks
- wireless networks
- security requirements
- cryptographic algorithms
- wireless communication
- mobile devices
- security properties
- key management
- artificial immune algorithm
- user authentication
- resource constrained
- security issues
- smart card
- operating system
- authentication scheme
- security analysis
- access control
- public key cryptography
- personal information
- security systems
- rfid tags
- biometric authentication
- public key infrastructure
- mobile communication
- public key
- information systems