Threshold Authenticated Key Configuration Scheme Based on Multi-layer Clustering in Mobile Ad Hoc

In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc multi-layer routing protocols. Our proposed protocol design...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lee, Keun-Ho, Han, Sang-Bum, Suh, Heyi-Sook, Hwang, Chong-Sun, Lee, SangKeun
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!