Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
Milad Tatar MamaghaniAli KuhestaniHamid BehrooziPublished in: Wirel. Networks (2021)
Keyphrases
- multi hop
- security policies
- wireless networks
- transmission power
- wireless sensor networks
- ad hoc networks
- mobile ad hoc networks
- physical layer
- data transmission
- network layer
- end to end
- wireless ad hoc networks
- energy efficient
- routing protocol
- base station
- key management
- sensitive data
- energy consumption
- hop count
- access control
- cellular networks
- routing algorithm
- information security
- power control
- end to end delay
- network security
- wifi
- intrusion detection
- sensor networks
- privacy preserving
- network lifetime
- computer networks
- network topology
- smart card
- wireless mesh networks
- wireless communication
- high speed
- multipath