“…The fact that, i) no central authorization entity is assumed at all times for all nodes which makes the task of network operations more difficult [10] and ii) indicates the need for distributed algorithms to provide the functions of centralized entities. KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
Section: D) Key Distribution With Entity Authentication For Efficientmentioning
This paper studies mobile Ad hoc network technology uses and how it can be used in real life applications. As now a day's lots of Research is going on automotive vehicles, if mobile ad hoc network is used to represent vehicles on roads and vehicle to vehicle communication is made possible then travelling will be easy and enjoyable. Due to mobile nature and scalability in mobile ad hoc networks anyone in the network can communicate anytime anywhere. This paper gives quick overview of existing technologies in MANETs.
“…The fact that, i) no central authorization entity is assumed at all times for all nodes which makes the task of network operations more difficult [10] and ii) indicates the need for distributed algorithms to provide the functions of centralized entities. KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
Section: D) Key Distribution With Entity Authentication For Efficientmentioning
This paper studies mobile Ad hoc network technology uses and how it can be used in real life applications. As now a day's lots of Research is going on automotive vehicles, if mobile ad hoc network is used to represent vehicles on roads and vehicle to vehicle communication is made possible then travelling will be easy and enjoyable. Due to mobile nature and scalability in mobile ad hoc networks anyone in the network can communicate anytime anywhere. This paper gives quick overview of existing technologies in MANETs.
“…Global system for mobile communication) (GSM) is more common in Europe and uses a stream cipher algorithms such as A5/1 algorithm, to protect the security and privacy of point-to-point wireless communication systems. However, in U.S.A, Code Division Multiple Access (CDMA) technologies use spread spectrum technique to provide strong protection system which makes it difficult to be intercepted except by skilled hackers and law enforcement [17].…”
Section: Security Requirements and Countermeasuresmentioning
“…Step (6): The jth authentication process ends. If wants to perform the above protocol for the next round of mutual authentication between the system and user, user again want to set j=j+1 and goes to Step (0).…”
Section: The Jth Authentication Protocol For Mobile User and The Systemmentioning
confidence: 99%
“…The computation requirement for mobile device is quite low. Maria et al, [6] focuses on the design of key management (KM) for the environment of Mobile Ad Hoc Networks (MANETs). KM ensures communication security among nodes and the capability of their cooperation as a secure group.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.