Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks.
Ang GaoPublished in: J. Digit. Content Technol. its Appl. (2010)
Keyphrases
- ad hoc networks
- group key agreement
- mac protocol
- mobile nodes
- network topology
- routing protocol
- end to end
- secure routing
- ns simulator
- key management
- wired networks
- routing algorithm
- wireless ad hoc networks
- quality of service
- routing scheme
- aodv routing protocol
- node mobility
- authentication protocol
- wireless networks
- medium access
- peer to peer
- mobile ad hoc networks
- secret key
- multi hop
- multi path routing
- end to end delay
- wireless mesh networks
- route discovery
- label switching
- network simulator
- key establishment
- ad hoc on demand distance vector
- base station
- qos routing
- network infrastructure
- mobile networks
- packet delivery
- provably secure
- key management scheme
- routing overhead
- energy efficient
- intrusion detection
- group communication
- real time