A distributed security scheme for ad hoc networks.
Dhaval GadaRajat GogriPunit RathodZalak DedhiaNirali ModySugata SanyalAjith AbrahamPublished in: ACM Crossroads (2004)
Keyphrases
- ad hoc networks
- key management
- key management scheme
- identity based cryptography
- secure communication
- peer to peer
- key distribution
- ns simulator
- network nodes
- network topology
- group communication
- routing algorithm
- wireless networks
- wireless ad hoc networks
- routing protocol
- end to end
- provably secure
- wireless mesh networks
- routing scheme
- distributed systems
- mobile nodes
- multi hop
- mobile ad hoc networks
- wired networks
- quality of service
- wireless sensor networks
- end to end delay
- base station
- mobile networks
- distributed computing
- security protocols
- aodv routing protocol
- access control
- malicious nodes
- elliptic curve
- secure routing
- fault tolerant
- mac protocol
- mobile agents
- computer networks
- signcryption scheme
- intrusion detection
- security requirements
- key establishment
- security mechanisms
- digital libraries
- security policies
- data transmission
- multiple paths
- public key cryptography
- diffie hellman
- secret key
- resource constrained
- network security
- real time
- security analysis