Secure V2V Ad Hoc Routing Protocol Using Digital Signatures.
Dan ShinatoMichiko HarayamaMiwako MishimaPublished in: ICEIC (2024)
Keyphrases
- digital signature
- routing protocol
- key management
- ad hoc networks
- wireless sensor networks
- smart card
- public key
- routing algorithm
- mobile ad hoc networks
- security mechanisms
- sensor networks
- energy consumption
- security protocols
- key distribution
- secure routing
- signature scheme
- resource constrained
- data integrity
- digital watermarking
- elliptic curve
- sensor nodes
- end to end
- lightweight
- low cost
- digital images
- digital libraries