|
Volumn , Issue , 2009, Pages
|
Preventing unauthorized messages in DTN based mobile ad hoc networks
a a |
Author keywords
Connectivity; Delay tolerant network (DTN); Heterogeneous wireless networks; Intermittent links; Security; Unathorized traffic
|
Indexed keywords
ASYMMETRIC KEY CRYPTOGRAPHY;
COMPUTATION OVERHEADS;
DELAY TOLERANT NETWORKS;
HETEROGENEOUS WIRELESS NETWORK;
INTERMEDIATE NETWORKS;
INTERMEDIATE NODE;
KEY CHAIN;
MOBILE NODES;
NETWORK COVERAGE;
NETWORK INFRASTRUCTURE;
NETWORK MANAGERS;
SECURITY CHALLENGES;
SIMULATION STUDIES;
SUPERNODES;
SYMMETRIC KEY CRYPTOGRAPHY;
SYSTEM ARCHITECTURES;
BLOCK CODES;
CRYPTOGRAPHY;
MOBILE AD HOC NETWORKS;
MOBILE TELECOMMUNICATION SYSTEMS;
ROUTERS;
TELECOMMUNICATION LINKS;
AD HOC NETWORKS;
|
EID: 77951609111
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/GLOCOM.2009.5425467 Document Type: Conference Paper |
Times cited : (10)
|
References (11)
|