An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks.
Clifton J. MulkeyDulal C. KarAjay K. KatangurPublished in: Int. J. Cyber Warf. Terror. (2013)
Keyphrases
- resource constrained
- wireless networks
- security mechanisms
- wired networks
- authentication protocol
- rfid tags
- wireless sensor networks
- security protocols
- wireless local area network
- wireless technologies
- cellular networks
- wireless communication
- sensor networks
- embedded systems
- ad hoc networks
- resource constraints
- link layer
- medium access control
- network infrastructure
- mobile nodes
- base station
- key management
- cross layer
- lightweight
- mobile computing
- trusted third party
- mobile ipv
- mobile networks
- wireless mesh networks
- security issues
- multi hop
- sensor nodes
- low cost
- wifi
- access points
- mobile devices
- energy consumption
- smart card
- cost effective
- mobility management
- routing protocol
- network access
- wireless ad hoc networks
- mobile terminals
- rfid technology
- public key
- mac layer