Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
|
Volume 7 - Issue 2 |
Published: May 2017 |
Authors: Ola H. Younis, Salah E. Essa, Ayman El-Sayed |
![]() |
Ola H. Younis, Salah E. Essa, Ayman El-Sayed . Defense Mechanisms in Mobile Ad-hoc Networks. Communications on Applied Electronics. 7, 2 (May 2017), 19-28. DOI=10.5120/cae2017652601
@article{ 10.5120/cae2017652601, author = { Ola H. Younis,Salah E. Essa,Ayman El-Sayed }, title = { Defense Mechanisms in Mobile Ad-hoc Networks }, journal = { Communications on Applied Electronics }, year = { 2017 }, volume = { 7 }, number = { 2 }, pages = { 19-28 }, doi = { 10.5120/cae2017652601 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2017 %A Ola H. Younis %A Salah E. Essa %A Ayman El-Sayed %T Defense Mechanisms in Mobile Ad-hoc Networks%T %J Communications on Applied Electronics %V 7 %N 2 %P 19-28 %R 10.5120/cae2017652601 %I Foundation of Computer Science (FCS), NY, USA
One of the most important issues for mobile ad-hoc Networks (MANETs) is Security. The feature of MANETs posture both difficulties and openings in accomplishing security objectives, for example, privacy, validation, respectability, accessibility, control of access, and non-repudiation at the end. The techniques of Cryptographic are generally utilized for secure interchanges in wired and remote systems. Most mechanisms of cryptographic, for example, symmetric and asymmetric cryptography, frequently include the utilization of cryptographic keys. Nevertheless, every single cryptographic method will be useless if the management of the key is feeble. The Management of Key is additionally a focal segment in MANET security. The motivation behind key management is to give secure strategies to taking care of cryptographic keying materials.