Alomari, 2015 - Google Patents
Mutual authentication and updating the authentication key in manetsAlomari, 2015
- Document ID
- 1452881880280485501
- Author
- Alomari A
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Abstract Mobile Ad hoc Networks (MANETs) are new wireless networks with a self- configuring and self-maintaining topology, also characterized as dynamic topology. The architecture in MANETs has been introduced few years ago and its main characteristic is …
- 238000004891 communication 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vinayakan et al. | A Secured On-Demand Routing Protocol for Mobile Ad-Hoc Network-A Literature Survey | |
Gupte et al. | Secure routing in mobile wireless ad hoc networks | |
Moudni et al. | Secure routing protocols for mobile ad hoc networks | |
Gupta et al. | A review of routing protocols for mobile ad hoc networks | |
WO2013008026A2 (en) | Framework for ubiquitous networking | |
Kousar et al. | A Secure Data Dissemination in a DHT‐Based Routing Paradigm for Wireless Ad Hoc Network | |
Moamen et al. | Secure multicast routing protocols in mobile ad‐hoc networks | |
Eichler et al. | Secure routing in a vehicular ad hoc network | |
Nissar et al. | Lightweight authentication-based scheme for AODV in ad-hoc networks | |
Selvakumar et al. | Secure group key management protocol for mobile ad hoc networks | |
Alomari | Mutual authentication and updating the authentication key in manets | |
Sathiamoorthy et al. | STFDR: Architecture of competent protocol for efficient route discovery and reliable transmission in CEAACK MANETs | |
Qazi et al. | Securing wireless mesh networks with ticket-based authentication | |
Pani et al. | Secure hybrid routing for MANET resilient to internal and external attacks | |
Qabajeh et al. | A more secure and scalable routing protocol for mobile ad hoc networks | |
Li et al. | SEAODV: a security enhanced AODV routing protocol for wireless mesh networks | |
Panday et al. | A Review on security Issues of AODV routing protocol for MANETs | |
Srivastava et al. | Secure Data Transmission in MANET Routing Protocol | |
Boukerche et al. | ARMA: an efficient secure ad hoc routing protocol | |
Nguyan et al. | Security routing analysis for mobile ad hoc networks | |
Annadurai et al. | Highly reputed authenticated routing in MANET (HRARAN) | |
Qabajeh et al. | Secure unicast position-based routing protocols for ad-hoc networks | |
Sheklabadi et al. | An anonymous secure routing protocol for mobile ad hoc networks | |
Phung et al. | DASSR: A distributed authentication scheme for secure routing in wireless ad-hoc networks | |
Christy et al. | Two-Level Data Packet Security Mechanism ï¿ ½ Secure Location-Aided Routing (SLAR) |