Advanced security gateways for heterogeneous tactical ad hoc networks.
Christoph BarzFlorian QuinkertPublished in: ICMCIS (2015)
Keyphrases
- ad hoc networks
- key management
- network topology
- mobile nodes
- identity based cryptography
- routing protocol
- end to end
- routing algorithm
- wireless ad hoc networks
- wireless networks
- group key agreement
- quality of service
- key management scheme
- ns simulator
- secure routing
- wired networks
- multi hop
- mobile ad hoc networks
- mobile networks
- mac protocol
- intrusion detection
- qos routing
- peer to peer
- security protocols
- end to end delay
- security requirements
- access control
- network security
- base station
- mobile wireless
- information security
- key distribution
- elliptic curve
- network infrastructure
- aodv routing protocol
- security issues
- security mechanisms
- multiple paths
- network services
- encryption algorithm
- security analysis
- web services
- response time
- digital libraries