Secure communications for cluster-based ad hoc networks using node identities.
Jung-San LeeChin-Chen ChangPublished in: J. Netw. Comput. Appl. (2007)
Keyphrases
- ad hoc networks
- key management
- key management scheme
- network nodes
- group communication
- neighboring nodes
- topology control
- mobile nodes
- secure routing
- group key agreement
- network topology
- routing protocol
- secure communication
- wireless ad hoc networks
- wireless networks
- end to end
- routing algorithm
- aodv routing protocol
- key distribution
- wireless mesh networks
- transmission range
- quality of service
- multi hop
- mobile wireless
- mobile ad hoc networks
- peer to peer
- mobile networks
- node mobility
- base station
- intermediate nodes
- service differentiation
- security protocols
- mac protocol
- end to end delay
- communication systems
- real time
- communication networks
- security requirements
- security issues
- wireless sensor networks