Securing mobile Ad hoc networks: key management and routing

KK Chauhan, AKS Sanger - arXiv preprint arXiv:1205.2432, 2012 - arxiv.org
Secure communication between two nodes in a network depends on reliable key
management systems that generate and distribute keys between communicating nodes and …

[PDF][PDF] Modelling efficient process oriented architecture for secure mobile commerce using hybrid routing protocol in mobile adhoc network

CN Kiran, GN Kumar - International Journal of Computer Science Issues …, 2012 - Citeseer
The proposed research work presents a novel approach of process oriented architecture for
secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing …

[PDF][PDF] Demand Based Effective Energy Utilization in Mobile Ad Hoc Networks

R Bhuvaneswari, M Viswanathan - International Journal of Computer …, 2012 - Citeseer
Abstract Mobile Ad Hoc Networks (MANET) are the collection of mobile nodes without any
centralized infrastructure. The underlying assumption is that the intermediate nodes …

[PDF][PDF] Source Initiated Energy Efficient Scheme for Mobile Ad Hoc Networks

R Bhuvaneswari, M Viswanathan - IJCSIS 2012, 2012 - academia.edu
In Mobile Ad Hoc Networks (MANETs), nodes are organized in a random manner without
any centralized infrastructure. Due to node mobility and limited bandwidth, nodes consume …

[引用][C] The Secure Dynamic Source Routing Protocol in MANET using MD5 Hash Function

RS Savankar, SV Dhopte - International Journal of Engineering Innovation …, 2012