Key Management Using Newton's Interpolation Method for MANET

Download Now
Provided by: International Journal of Advanced Research in Computer Science & Technology (IJARCST)
Topic: Networking
Format: PDF
The wireless medium is uncovered, vulnerable to different routing attacks and intruders can hack nodes effortlessly. The confidentiality and authentication are the main elements of security framework. The wireless networks are unstable and unreliable because of various factors like topology changes are frequent, limited bandwidth and absence of a centralized control. A reliable key management and chaining is required to implement a standard security framework. The proposed paper leverages the advantages of Newton's interpolation method to implement the key chaining for MANET.
Download Now

Find By Topic