Proceedings of the 7th International Conference on Security of Information and Networks 2014
DOI: 10.1145/2659651.2659725
|View full text |Cite
|
Sign up to set email alerts
|

Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network

Abstract: During last decade, wireless ad hoc networks have been widely used for communication, transferring data or sharing some information for specific members.Nowadays security protocols play a fundamental role to provide a level of security for wireless local area networks (WLAN). Moreover, one of the most important issues to improve security by help of cryptography algorithms is generating a common key among participants to intercommunicate securely. The aim of thesis is creating a common secret key by means of Di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…literature [2], [3]. One of the limitations of the synchronous schemes is that they require all the participants to be always online during the execution of the GKE protocol.…”
Section: Introductionmentioning
confidence: 99%
“…literature [2], [3]. One of the limitations of the synchronous schemes is that they require all the participants to be always online during the execution of the GKE protocol.…”
Section: Introductionmentioning
confidence: 99%