Securing wireless ad hoc networks: towards agent security architecture
| dc.contributor.author | Li, X. | |
| dc.contributor.author | Slay, J. | |
| dc.contributor.conference | Fifth Australian Information Warfare and Security Conference 2004 (25 Nov 2004 : Perth, Western Australia) | |
| dc.date.issued | 2004 | |
| dc.description.abstract | Achieving secure communication is especially challenging in wireless ad hoc networks, where no infrastructure or central authority exists, and the state and topology of the network is dynamic and fault-prone. These unique characteristics of wireless ad hoc networks make traditional cryptographic mechanisms and assumptions in appropriate. In this paper, we propose mobile agents as a solution to the key management for wireless ad hoc networks and examine the feasibility of such a solution | |
| dc.identifier.citation | Proceedings of the Fifth Australian Information Warfare and Security Conference: From Information Warfare to Information Operations, 2004, pp.1-5 | |
| dc.identifier.isbn | 9780729805698 | |
| dc.identifier.uri | https://hdl.handle.net/1959.8/26788 | |
| dc.language.iso | en | |
| dc.publisher | Edith Cowan University | |
| dc.publisher.place | Western Australia | |
| dc.rights | Copyright 2004 The author(s) | |
| dc.title | Securing wireless ad hoc networks: towards agent security architecture | |
| dc.type | Conference paper | |
| pubs.publication-status | Published | |
| ror.mmsid | 9915913429101831 |