Foundations of Security for Hash Chains in Ad Hoc Networks.
Phillip G. BradfordOlga V. GavrylyakoPublished in: ICDCS Workshops (2003)
Keyphrases
- ad hoc networks
- key management
- network topology
- identity based cryptography
- group key agreement
- routing protocol
- wireless ad hoc networks
- end to end
- wired networks
- quality of service
- routing algorithm
- secure routing
- key management scheme
- wireless networks
- ns simulator
- mobile wireless
- mac protocol
- peer to peer
- multi hop
- intrusion detection
- information security
- mobile networks
- security protocols
- key distribution
- access control
- base station
- security requirements
- security issues
- qos routing
- mobile ad hoc networks
- wireless sensor networks
- hash functions
- security policies
- multipath routing
- neighboring nodes
- network nodes
- network infrastructure
- multiple paths
- propagation model
- service differentiation
- key establishment
- aodv routing protocol
- network security
- mobile nodes