A New Key Management Protocol for WMN’s And Ad Hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
A foremost challenge in developing systems is to overcome the difficulties of the theoretically incomplete communication from the group to the sender, the unattainability of a completely trusted key generation center and the dynamics of the sender. The prevailing key management patterns cannot deal with these challenges efficiently. The new pattern is a hybrid of traditional transmission encryption and group key agreement. Later the public group encryption key is extracted both the calculation overhead and the communication cost are autonomous of the group size. Also the preparation enables simple yet effective member deletion, addition and malleable strategies. Its durable security against collusion, its continuous overhead and its application approachability without relying on a fully trusted authority reduce our protocol a very favorable solution to many applications.
Authors and Affiliations
V. S. V. Deepak, B. Veerendra, B. Lakshmanarao
An Fpga Implementation Of N/N+1 Prescaler For A Low Power Single Phase Clock Distribution System
In the VLSI design clock distribution in an IC is very important as it deals with 70% of the power consumption. This paper deals with the design of prescaler to reduce the power consumption by the clock. A prescaler...
Cloud Computing Services to Business perspective
Cloud Computing Services shows to offer significant cost advantages. Particularly start-up companies benefit from these advantages, since frequently they do not operate an internal IT infrastructure. But those costs...
Design of Intelligent Transport Related Issue System Based On ARM7
There are millions of vehicles are passing through roads every day. Time, safety and efficiency are the major factors, While mode of transportation plays an important role in urbanization. Through this paper integrat...
A New Filtering Technique for denoising Speckle Noise from Medical Images Based on Adaptive and Anisotropic Diffusion Filter
This is a preliminary study and the objective of this study has been to compare the performance of some of the primitive and fundamentally different post acquisition image enhancement algorithms as applied to differen...
An algorithm for normal profile generation and for attack detection in terms of detection accuracy
We present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for precise network traffic description by take out the geometrical correlations between network traffic features. Our MCA-ba...