Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Mihai-Lica PuraVictor Valeriu PatriciuIon BicaPublished in: SECRYPT (2009)
Keyphrases
- identity based cryptography
- ad hoc networks
- key management
- aodv routing protocol
- wireless networks
- wireless ad hoc networks
- routing algorithm
- ns simulator
- end to end
- routing protocol
- secret sharing scheme
- key distribution
- peer to peer
- mobile ad hoc networks
- end to end delay
- bilinear pairings
- multi hop
- mac protocol
- secure communication
- wireless sensor networks
- digital signature
- mobile networks
- mobile nodes
- quality of service
- wireless mesh networks
- group communication
- provably secure