2009
DOI: 10.1016/j.jnca.2009.02.008
|View full text |Cite
|
Sign up to set email alerts
|

Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Finally, the security examination and simulation outcomes were offered to assess the NACK performance. In 2009, Feng et al [59] have implemented an approach that comprises of two phases, where, the initial stage was to construct a key pre-sharing approach depending on LIPG and hash operation, and the subsequent stage chiefly handles with recovering key in a much secure approach. Finally, the investigational outcomes illustrate that this model can guarantee the MANET security surroundings with enhanced performance.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, the security examination and simulation outcomes were offered to assess the NACK performance. In 2009, Feng et al [59] have implemented an approach that comprises of two phases, where, the initial stage was to construct a key pre-sharing approach depending on LIPG and hash operation, and the subsequent stage chiefly handles with recovering key in a much secure approach. Finally, the investigational outcomes illustrate that this model can guarantee the MANET security surroundings with enhanced performance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various MANET authentication schemes are reviewed in this work as shown in Fig 1, which comprises [7], Timestamp method [8], GASMAN [9], Poissonization scheme [10], SUPERMAN [11], PCA [37], RIPsec [38], peer-to-peer model [44], HEAP [48] schemes. In addition, models like JATC scheme [12], Dempster-Shafer [14], SDRAC [16], IBBE scheme [5] [46], Trilateration Model [18], DSR [20], DTD method [21], Hashing Algorithm [28], Netpro [30], GS scheme [32], QASEC [33], BSG [35], DTQCAR [36], CLPKM [39], Tidal trust algorithm [47], E-voting protocol [54], NACK [58], LIPG [59], IDDIP [60] and Game theoretic Model [65] are also adopted in different contributions.…”
Section: Algorithmic Analysismentioning
confidence: 99%
“…A mobile Ad Hoc NETwork (MANET) has been emerged for a variety of applications such as in emergency search and rescue operations, in battlefields, or in setting up of instant communication among moving vehicles [1]. Such a Mobile Ad Hoc Network normally is a type of multi-hop network formed temporally by a group of nonnfrastructure wireless mobile nodes that relays data packets from one to another in order to communicate with the remote nodes beyond the radio distance [2].…”
Section: Introductionmentioning
confidence: 99%
“…Routing attacks against mobile Ad Hoc network is one of the most effective way. Mobile Ad Hoc Networks to resist the attacks, can use some of the traditional intrusion prevention technology as the protection of mobile Ad Hoc network routing security first line of defense, such as authentication, encryption, secure routing protocols [2]. But the intrusion prevention technologies can only reduce the number of attacks, the system will inevitably there are some loopholes, there could be an attacker penetrated the weak link, intrusion prevention technology does not completely eliminate the attack.…”
Section: Introductionmentioning
confidence: 99%