Parallel key management scheme for mobile ad hoc network based on traffic mining

  • R. Pushpa Lakshmi, A. Vincent Antony Kumar
  • IET Information Security, January 2015, the Institution of Engineering and Technology (the IET)
  • DOI: 10.1049/iet-ifs.2013.0076

key management in adhoc network through traffic mining

What is it about?

Cryptography is an commonly used technique to improve the security level. We applied data mining concept to analyze traffic pattern, which is used for generating key. The idea of applying traffic mining in key generation is a new concept.

Why is it important?

We proposed a method that satisfy all basic security requirements and withstand network attacks even in the presence of attackers.

Perspectives

Dr Pushpa R Lakshmi
PSNA

The proposed methodology of applying mining in network security shows improvement in network performance.

Read Publication

http://dx.doi.org/10.1049/iet-ifs.2013.0076

The following have contributed to this page: Dr Pushpa R Lakshmi