Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings

International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)

Jianhong Zhou
Jianhong Zhou
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

Wireless network was one of the most popular, vibrant and active field of communication in computing industry in the past decade but in the present times researchers are ardently interested in exploration of solutions to various challenges over ad hoc networks. The solution to achieve secure routing over ad hoc networks has been taken into consideration in this paper. Security in ad hoc networks is difficult to achieve because of the vulnerability of wireless links, mobility of nodes, dynamic network topology, limited physical protection of nodes, absence of a certification authority, and the lack of a centralized infrastructure. Moreover the...

1. Introduction
2. Security
3. Cryptographic Background
4. Diffie-Hellman Algorithm of Key Exchange
5. Demonstration of Algorithm
6. Results
7. Conclusion and Future Works
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal