Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
Mike BurmesterTri Van LeAlec YasinsacPublished in: ADHOC-NOW (2004)
Keyphrases
- ad hoc networks
- key management
- network topology
- routing protocol
- identity based cryptography
- wireless ad hoc networks
- routing algorithm
- end to end
- group key agreement
- wireless networks
- quality of service
- secure routing
- key management scheme
- ns simulator
- wired networks
- mobile wireless
- mobile ad hoc networks
- end to end delay
- mac protocol
- key distribution
- multi hop
- peer to peer
- network security
- base station
- security issues
- mobile networks
- information security
- security protocols
- multiple description coding
- wireless mesh networks
- access control
- service differentiation
- neighboring nodes
- wireless sensor networks
- mobile nodes
- intrusion detection
- multipath routing
- security policies
- multiple paths
- diffie hellman
- network management
- network nodes
- security requirements