Who are you? Secure identities in single hop ad hoc networks.
Seth GilbertCalvin NewportChaodong ZhengPublished in: Distributed Comput. (2017)
Keyphrases
- propagation model
- ad hoc networks
- key management
- network topology
- routing protocol
- wireless networks
- wireless ad hoc networks
- end to end
- secure communication
- secure routing
- routing algorithm
- group key agreement
- base station
- quality of service
- key management scheme
- mobile networks
- peer to peer
- mac protocol
- mobile wireless
- mobile ad hoc networks
- mobile nodes
- multi hop
- data transmission
- network infrastructure
- wired networks
- group communication
- wireless mesh networks
- qos routing
- identity based cryptography