What is it about?

Key management scheme using Hierarchical clustering based on dominating set is proposed to improve security level. Two factors: trust ability of nodes, and probability of future contact of nodes are used in electing dominators. We also discuss about the procedure involved in inter and intra cluster communication.

Featured Image

Why is it important?

We define the mechanism for selecting cluster heads and clustering by mainly focusing on security issues in communication.

Perspectives

We discuss our initial step of applying dominator based clustering using trust values with key management.

Dr Pushpa R Lakshmi
PSNA

Read the Original

This page is a summary of: Cluster Based Composite Key Management in Mobile Ad Hoc Networks, International Journal of Computer Applications, July 2010, Foundation of Computer Science,
DOI: 10.5120/836-1026.
You can read the full text:

Read

Contributors

The following have contributed to this page