What is it about?
Key management scheme using Hierarchical clustering based on dominating set is proposed to improve security level. Two factors: trust ability of nodes, and probability of future contact of nodes are used in electing dominators. We also discuss about the procedure involved in inter and intra cluster communication.
Featured Image
Why is it important?
We define the mechanism for selecting cluster heads and clustering by mainly focusing on security issues in communication.
Perspectives
Read the Original
This page is a summary of: Cluster Based Composite Key Management in Mobile Ad Hoc Networks, International Journal of Computer Applications, July 2010, Foundation of Computer Science,
DOI: 10.5120/836-1026.
You can read the full text:
Contributors
The following have contributed to this page