2009 IEEE International Advance Computing Conference 2009
DOI: 10.1109/iadcc.2009.4809203
|View full text |Cite
|
Sign up to set email alerts
|

Threshold Cryptography & Genetic Algorithm Based Secure Key Exchange for Mobile Hosts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…GA-based Secure Key Exchange In a MANET, freely moving nodes can lose connectivity to their neighbors and, hence, rejoin the network many times, which may generate vulnerabilities exploitable by malicious agents. Security issues due to node mobility are studied in [106], where threshold cryptography ensures trust among MANET nodes. A GA is used to verify secure key exchanges among nodes by providing efficient authentication of the nodes entering the network.…”
Section: Genetic Algorithmsmentioning
confidence: 99%
“…GA-based Secure Key Exchange In a MANET, freely moving nodes can lose connectivity to their neighbors and, hence, rejoin the network many times, which may generate vulnerabilities exploitable by malicious agents. Security issues due to node mobility are studied in [106], where threshold cryptography ensures trust among MANET nodes. A GA is used to verify secure key exchanges among nodes by providing efficient authentication of the nodes entering the network.…”
Section: Genetic Algorithmsmentioning
confidence: 99%
“…Rondeau mentions several methods for evaluating multi-objective optimization problems, including the weighted-sum approach, the linear-logarithmic function, and the constant-elasticity-of-substitution function [5]. Rondeau ultimately uses evolutionary based genetic algorithms (GAs) to address his MOO problems, and this approach has been embraced by researchers in a wide variety of application domains, including economics [50], mechanical engineering [51], and cryptography [52]. Guided search algorithms like GAs are well suited to finding solutions in large search spaces.…”
Section: Decision Makingmentioning
confidence: 99%