Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
DOI: 10.1109/csac.1998.738651
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…In this scenario, the usual authentication and encryption methods would not apply to a MANET the same way they would in a wired network [22]. However, both authentication and encryption are even more important in a MANET [23,24]. Steiner et al have developed a Group key Diffie-Hellman (GDH) model that provides a flexible solution to group key management.…”
Section: Review Of Manet Attack Prevention Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…In this scenario, the usual authentication and encryption methods would not apply to a MANET the same way they would in a wired network [22]. However, both authentication and encryption are even more important in a MANET [23,24]. Steiner et al have developed a Group key Diffie-Hellman (GDH) model that provides a flexible solution to group key management.…”
Section: Review Of Manet Attack Prevention Securitymentioning
confidence: 99%
“…Lu et al [23] proposed an algorithm for fair service in error-prone wireless channels this algorithm provides short term fairness among flows which perceive a clean channel, long term throughput and fairness bounds for all flows with bounded channel error, an expanded schedulable region by decoupling delay/bandwidth weights, and supports both delay sensitive and error sensitive data flows. This wireless fair service algorithm attempts to provide solution for denial of service attacks, by providing a performance effective fair service in error-prone communication channels.…”
Section: Security Approaches For Host Attacked By Mobile Agentsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scenario, the usual authentication and encryption methods would not apply to a MANET the same way they would in a wired network [32]. However, both authentication and encryption are even more important in a MANET [27,28] A reactive routing method was proposed by Yang et al [49]. In this method, a unified network layer prevention method known as Self Organized Security (SOS) scheme that uses AODV routing is used.…”
Section: Classification and Review Of Manet Security Schemesmentioning
confidence: 99%