Keyphrases
- key exchange protocol
- authentication protocol
- adhoc network
- security issues
- security measures
- authentication mechanism
- routing protocol
- block cipher
- wireless ad hoc networks
- ad hoc networks
- key management scheme
- key management
- routing overhead
- mobile ad hoc networks
- security mechanisms
- security requirements
- information leakage
- user authentication
- security management
- smart card
- security analysis
- end to end delay
- authentication scheme
- countermeasures
- intrusion detection
- network topology
- key agreement
- routing algorithm
- lightweight