Ad Hoc Network Authentication: A Jini-Based Approach.
D. M. NeedhamM. M. McMahonJ. B. DatkoPublished in: International Conference on Wireless Networks (2003)
Keyphrases
- ad hoc networks
- wireless ad hoc networks
- network topology
- routing protocol
- wireless networks
- secure communication
- routing algorithm
- end to end
- quality of service
- trust relationships
- mobile wireless
- base station
- multi hop
- mobile nodes
- identity based cryptography
- aodv routing protocol
- limited bandwidth
- key management
- end to end delay
- service differentiation
- mobile networks
- network nodes
- peer to peer
- mobile ad hoc networks
- mac protocol
- propagation model
- routing scheme
- secure routing
- network infrastructure