What is it about?
Cryptography is an commonly used technique to improve the security level. We applied data mining concept to analyze traffic pattern, which is used for generating key. The idea of applying traffic mining in key generation is a new concept.
Featured Image
Why is it important?
We proposed a method that satisfy all basic security requirements and withstand network attacks even in the presence of attackers.
Perspectives
Read the Original
This page is a summary of: Parallel key management scheme for mobile ad hoc network based on traffic mining, IET Information Security, January 2015, the Institution of Engineering and Technology (the IET),
DOI: 10.1049/iet-ifs.2013.0076.
You can read the full text:
Contributors
The following have contributed to this page