Foundations of Security for Hash Chains in Ad Hoc Networks.
Phillip G. BradfordOlga V. GavrylyakoPublished in: Clust. Comput. (2005)
Keyphrases
- ad hoc networks
- key management
- network topology
- routing algorithm
- wireless networks
- end to end
- key management scheme
- wireless ad hoc networks
- identity based cryptography
- group key agreement
- secure routing
- quality of service
- routing protocol
- multi hop
- wired networks
- information security
- ns simulator
- mobile wireless
- key distribution
- peer to peer
- base station
- mac protocol
- access control
- security issues
- security policies
- security protocols
- mobile ad hoc networks
- end to end delay
- mobile networks
- key establishment
- intrusion detection
- sensor networks
- hash functions
- security mechanisms
- resource constrained
- digital libraries
- security requirements
- multiple paths
- qos routing
- network infrastructure
- elliptic curve