Adaptive security for multilevel ad hoc networks.
Jiejun KongHaiyun LuoKaixin XuDaniel Lihui GuMario GerlaSongwu LuPublished in: Wirel. Commun. Mob. Comput. (2002)
Keyphrases
- ad hoc networks
- key management
- network topology
- wireless ad hoc networks
- routing protocol
- identity based cryptography
- end to end
- wireless networks
- routing algorithm
- group key agreement
- quality of service
- wired networks
- key management scheme
- mac protocol
- peer to peer
- secure routing
- base station
- mobile networks
- mobile ad hoc networks
- key distribution
- multi hop
- ns simulator
- mobile wireless
- service differentiation
- network security
- end to end delay
- neighboring nodes
- intrusion detection
- security requirements
- qos routing
- multi path routing
- wireless mesh networks
- network infrastructure
- access control
- resource constrained
- security policies
- multipath routing
- elliptic curve
- security protocols
- mobile nodes
- secret key
- real time