An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks.
V. S. JananiM. S. K. ManikandanPublished in: Int. J. Netw. Secur. (2018)
Keyphrases
- security protocols
- security services
- key management
- security properties
- trust management
- encryption scheme
- smart card
- cryptographic protocols
- encryption decryption
- information security
- fuzzy vault
- public key infrastructure
- clustering algorithm
- random number generator
- public key cryptography
- trusted computing
- trust model
- access control
- trust negotiation
- elliptic curve cryptography
- security requirements
- cryptographic algorithms
- security analysis
- trust relationships
- high assurance
- encryption key
- data mining
- data security
- security mechanisms
- security issues
- data points
- provably secure
- intrusion detection
- privacy concerns
- secure communication
- policy enforcement
- virtual communities
- network security
- security level
- digital signature
- security policies
- rfid tags
- public key encryption
- authentication protocol
- standard model
- secret key
- hierarchical clustering
- wireless sensor networks