What is it about?

Cryptography is an commonly used technique to improve the security level. We applied data mining concept to analyze traffic pattern, which is used for generating key. The idea of applying traffic mining in key generation is a new concept.

Featured Image

Why is it important?

We proposed a method that satisfy all basic security requirements and withstand network attacks even in the presence of attackers.

Perspectives

The proposed methodology of applying mining in network security shows improvement in network performance.

Dr Pushpa R Lakshmi
PSNA

Read the Original

This page is a summary of: Parallel key management scheme for mobile ad hoc network based on traffic mining, IET Information Security, January 2015, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-ifs.2013.0076.
You can read the full text:

Read

Contributors

The following have contributed to this page