2007
DOI: 10.1016/j.jnca.2006.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure communications for cluster-based ad hoc networks using node identities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 49 publications
(31 citation statements)
references
References 13 publications
0
31
0
Order By: Relevance
“…b) Source node number. These two fields together uniquely identifies [18] a message packet. Each data packet generated by a single node in this scheme is guaranteed to have different sequence number.…”
Section: A Flooding Attackmentioning
confidence: 99%
“…b) Source node number. These two fields together uniquely identifies [18] a message packet. Each data packet generated by a single node in this scheme is guaranteed to have different sequence number.…”
Section: A Flooding Attackmentioning
confidence: 99%
“…After validating the identities of mh i and mh l , CHID j and CHID k relay messages between these two nodes. In this circumstance, the comparisons between the related works [6,8] and our scheme in the computation loads of the involved nodes are shown in Table II. The computation loads of mh i and mh l of our scheme can be reduced by 25% in comparison with those of Reference [6].…”
Section: Involved Mobile Nodes In Different Clustersmentioning
confidence: 99%
“…In this circumstance, the comparisons between the related works [6,8] and our scheme in the computation loads of the involved nodes are shown in Table II. The computation loads of mh i and mh l of our scheme can be reduced by 25% in comparison with those of Reference [6]. Further- more, the communication overheads of CHID j and CHID k in our scheme are only half of those in Reference [8].…”
Section: Involved Mobile Nodes In Different Clustersmentioning
confidence: 99%
See 2 more Smart Citations