Computer Science – Networking and Internet Architecture
Scientific paper
2010-03-18
International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.1 (2010) 9-16
Computer Science
Networking and Internet Architecture
8 Pages, JGraph-Hoc Journal
Scientific paper
10.5121/jgraphhoc.2010.2102
Secured communication in ad hoc wireless networks is primarily important, because the communication signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. Nodes act both as hosts and routers and are interconnected by Multi- hop communication path for forwarding and receiving packets to/from other nodes. The objective of this paper is to propose a key exchange and encryption mechanism that aims to use the MAC address as an additional parameter as the message specific key[to encrypt]and forward data among the nodes. The nodes are organized in spanning tree fashion, as they avoid forming cycles and exchange of key occurs only with authenticated neighbors in ad hoc networks, where nodes join or leave the network dynamically.
Kumar Upendra B.
Sumathy S.
No associations
LandOfFree
Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-700390