Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion).
Silja MäkiPublished in: Security Protocols Workshop (2001)
Keyphrases
- ad hoc networks
- security architecture
- network topology
- access control
- routing algorithm
- routing protocol
- end to end
- security model
- wireless ad hoc networks
- security policies
- wireless networks
- security mechanisms
- quality of service
- key management
- mobile ad hoc networks
- multi hop
- peer to peer
- mac protocol
- data integrity
- simulation platform
- intrusion detection system
- data sets
- real time
- wireless mesh networks
- database
- intrusion detection