2012 20th Telecommunications Forum (TELFOR) 2012
DOI: 10.1109/telfor.2012.6419182
|View full text |Cite
|
Sign up to set email alerts
|

Identity Based Cryptography for secure AODV routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Optimal route values from the ACO-AODV algorithm are considered to find optimal values based on source nodes moving towards destination nodes. The distance between source ni and destination node nj is D, defined in Equation (17), and the future position of the mobile node based on current perception is defined in Equation (18).…”
Section: Patil and Borkarmentioning
confidence: 99%
“…Optimal route values from the ACO-AODV algorithm are considered to find optimal values based on source nodes moving towards destination nodes. The distance between source ni and destination node nj is D, defined in Equation (17), and the future position of the mobile node based on current perception is defined in Equation (18).…”
Section: Patil and Borkarmentioning
confidence: 99%
“…They too used it as a starting point for creating CPA safe Leakage-Resistant Identity-Based Encryption (LR-IBE). A common LR-IBE scheme with CPA security is constructed centered on IB-HPS [22]. Chow et al, have suggested three new IB-HPS designs [23].…”
Section: Wander Et Al Have Published An Energy Analysis On the Sensor...mentioning
confidence: 99%
“…A common LR-IBE scheme with CPA security is constructed centered on IB-HPS [22]. Chow et al, have suggested three new IB-HPS designs [23]. The common technique may then be used to generate three CPA secure LR-IBE models.…”
Section: Wander Et Al Have Published An Energy Analysis On the Sensor...mentioning
confidence: 99%
“…The technique is found to be completely independent of any additional key establishments. Sagheer and Taher [34] have used identity-based encryption over AODV to offer secured routing. A similar form of study was also carried out by Wan et al [35] where author have addressed the privacy problems as well as unlink ability issue in communication over MANET.…”
Section: B Studies In Mobile Ad Hoc Networkmentioning
confidence: 99%