An overlay approach to data security in ad-hoc networks.
Jörg LiebeherrGuangyu DongPublished in: Ad Hoc Networks (2007)
Keyphrases
- data security
- ad hoc networks
- access control
- routing protocol
- data centric
- network topology
- end to end
- wireless networks
- data management
- data integrity
- wireless ad hoc networks
- data privacy
- quality of service
- peer to peer
- privacy preserving data mining
- key management
- information security
- third party
- management system
- database
- databases
- data mining
- privacy preserving
- data storage
- data analysis
- smart card
- data driven
- energy consumption
- database design