Opportunistic key management in delay tolerant networks.
Sofia-Anna MenesidouVasilios KatosPublished in: Int. J. Inf. Comput. Secur. (2017)
Keyphrases
- delay tolerant
- key management
- ad hoc networks
- end to end delay
- network infrastructure
- road network
- routing protocol
- key management scheme
- wireless sensor networks
- resource constrained
- routing algorithm
- network topology
- mobile nodes
- wireless networks
- end to end
- peer to peer
- quality of service
- security protocols
- secret key
- location privacy
- network resources
- multi hop
- mobile ad hoc networks
- mobile users