Malicious node prevention and mitigation in MANETs using a hybrid security model.
Ambidi NaveenaKatta Rama Linga ReddyPublished in: Inf. Secur. J. A Glob. Perspect. (2018)
Keyphrases
- security model
- public key
- intermediate nodes
- security analysis
- security requirements
- access control
- topology control
- mobile ad hoc networks
- mobile nodes
- security architecture
- provably secure
- ad hoc networks
- smart card
- malicious nodes
- designated verifier
- routing protocol
- network nodes
- databases
- public key cryptography
- authentication and key agreement
- similarity search