Routing Protocol Security Using Symmetric Key Based Techniques.
Bezawada BruhadeshwarKishore KothapalliM. PoornimaM. DivyaPublished in: ARES (2009)
Keyphrases
- routing protocol
- key management
- ad hoc networks
- wireless sensor networks
- routing algorithm
- security requirements
- security protocols
- mobile ad hoc networks
- wireless ad hoc networks
- secure communication
- security services
- key management scheme
- security analysis
- key distribution
- information security
- energy consumption
- access control
- diffie hellman
- encryption scheme
- multi hop
- security mechanisms
- public key cryptography
- wireless networks
- encryption algorithm
- end to end
- sensor networks
- vehicular ad hoc networks
- elliptic curve
- security issues
- data protection
- security policies
- data centric
- multipath
- operating system
- data collection
- provably secure