Who Are You? Secure Identities in Ad Hoc Networks.
Seth GilbertCalvin C. NewportChaodong ZhengPublished in: DISC (2014)
Keyphrases
- ad hoc networks
- key management
- secure routing
- group key agreement
- secure communication
- network topology
- end to end
- key management scheme
- routing algorithm
- routing protocol
- wireless networks
- wireless ad hoc networks
- quality of service
- multi hop
- key distribution
- wired networks
- peer to peer
- mobile ad hoc networks
- group communication
- mobile wireless
- mobile networks
- end to end delay
- provably secure
- mac protocol
- base station
- network infrastructure
- network nodes
- key establishment
- diffie hellman
- security protocols
- qos routing
- wireless mesh networks
- energy consumption
- security analysis
- service differentiation
- elliptic curve
- wireless sensor networks
- mobile nodes
- security issues
- sensor networks