Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior.
YuLong ZouXianbin WangWeiming ShenPublished in: CSCWD (2013)
Keyphrases
- wireless networks
- security protocols
- authentication protocol
- wireless communication
- ad hoc networks
- automated design
- key management
- mobile computing
- cellular networks
- mobile networks
- wireless ad hoc networks
- low bandwidth
- security services
- security mechanisms
- multimedia services
- wireless mesh networks
- video delivery
- information systems
- secret key
- security requirements
- rfid tags
- cooperative
- wireless technologies
- security properties
- network coding