ZRP with WTLS Key Management Technique to Secure Transport and Network Layers in Mobile Adhoc Networks
نویسندگان
چکیده
منابع مشابه
Secure Cluster based Self Organized Authentication with Key Management Scheme in Vehicular Adhoc Network
Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...
متن کاملA Key Exchange Approach for Proficient and Secure Routing in Mobile Adhoc Networks
Mobile ad hoc networks (MANETs) are a collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a profi...
متن کاملSecure and reliable routing in mobile adhoc networks
The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can benefit from anywhere and at any time for impromptu collaboration. However, energy constrained nodes, low channel bandwidth, node mobility, high channel error rates, channel variability and packet loss are some of the limitations of MANETs. MAN...
متن کاملEnhanced QoS Based on Secure Reliable Key Routing Mechanism in Mobile Adhoc Network
Ad hoc wireless network is experiencing challenges due to various security issues and resource constraints in nature high mobility. There is always the challenge to create a reliable and optimized network for efficient routing. Ensuring a dynamic way that path which is known in communications is always a challenge in the mobile ad hoc network. Most of the existing secure routing protocols will ...
متن کاملOn Secure Key Management in Mobile Ad Hoc Networks
It is widely believed that although being more complex, a probabilistic key predistribution scheme is much more resilient against node capture than a deterministic one in lightweight wireless ad hoc networks. Backed up by the surprisingly large successful attack probabilities computed in this paper, we show that the probabilistic approaches have only limited performance advantages over determin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Wireless & Mobile Networks
سال: 2012
ISSN: 0975-4679
DOI: 10.5121/ijwmn.2012.4109