Limitations of existing wireless networks authentication and key management techniques for MANETs.
Ghazanfar Ali SafdarClare McGrathMáire McLoonePublished in: ISCN (2006)
Keyphrases
- ad hoc networks
- wireless networks
- key management
- key distribution
- identity based cryptography
- security services
- secure communication
- mobile ad hoc networks
- multi hop
- network topology
- wireless ad hoc networks
- wireless communication
- routing algorithm
- wired networks
- network access
- base station
- mobile nodes
- mobile networks
- wifi
- key management scheme
- security protocols
- digital signature
- multimedia services
- elliptic curve
- authentication protocol
- network coding
- public key cryptography
- end to end
- routing protocol
- wireless mesh networks
- wireless sensor networks
- routing problem
- real time