2009 First International Conference on Networks &Amp; Communications 2009
DOI: 10.1109/netcom.2009.74
|View full text |Cite
|
Sign up to set email alerts
|

Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Sumathy and Kumar 9 proposed the secure mechanism of encryption and key exchange for the communication of groups in wireless ad-hoc network. A MAC address is used in this technique as an extra advantage for the encryption of message key and data transmission among the clients.…”
Section: Related Workmentioning
confidence: 99%
“…Sumathy and Kumar 9 proposed the secure mechanism of encryption and key exchange for the communication of groups in wireless ad-hoc network. A MAC address is used in this technique as an extra advantage for the encryption of message key and data transmission among the clients.…”
Section: Related Workmentioning
confidence: 99%
“…A spanning tree is constructed by calculating the minimum distance between each and every nodes which can cover all the nodes without forming a cycle [10]. Spanning trees are easy to construct and cheap.…”
Section: Construction Of Spanning Treementioning
confidence: 99%
“…The message is first encrypted with the message specific key which is the MAC address. Then, the message specific key is encrypted with neighbourhood key [9], [10]. Then, the sender appends the destination nodes ID and sends to its authenticated neighbours.…”
Section: Encryption Of Messagementioning
confidence: 99%
See 2 more Smart Citations