The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Key Management Protocols in Mobile Ad Hoc Networks
|
Author(s): Mohamed Elboukhari (University Mohamed Ist, Oujda, Morocco), Mostafa Azizi (University Mohamed Ist, Oujda, Morocco)and Abdelmalek Azizi (University Mohamed Ist, Morocco and Academy Hassan II of Sciences & Technology, Morocco)
Copyright: 2011
Pages: 21
Source title:
Emerging Technologies in Wireless Ad-hoc Networks: Applications and Future Development
Source Author(s)/Editor(s): Raul Aquino-Santos (University of Colima, Mexico), Víctor Rangel-Licea (National Autonomous University of Mexico, Mexico)and Arthur Edwards-Block (University of Colima, México)
DOI: 10.4018/978-1-60960-027-3.ch010
Purchase
|
Abstract
Mobile ad hoc networks (MANETs) have received tremendous attention in recent years because of their self-organization and self-maintenance capabilities. MANETs are networks that do not have an underlying fixed infrastructure. However, these networks tend to be vulnerable to a number of attacks. They don’t obey a centralized network management functionality; furthermore, the network topology changes dynamically. Therefore, security has become a primary concern in MANETs. The major problem in providing security services in such networks is how to manage cryptography keys, making key management a central component in MANETs. This chapter gives an overview of security in this kind of network and presents a number of MANETs key management protocols according to recent literature.
Related Content
Nithin Kalorth, Vidya Deshpande.
© 2024.
7 pages.
|
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane.
© 2024.
24 pages.
|
T.S. Sujith.
© 2024.
13 pages.
|
C. Suganya, M. Vijayakumar.
© 2024.
11 pages.
|
B. Harry, Vijayakumar Muthusamy.
© 2024.
19 pages.
|
Munise Hayrun Sağlam, Ibrahim Kirçova.
© 2024.
19 pages.
|
Elif Karakoç Keskin.
© 2024.
19 pages.
|
|
|