Learn More
Previous key management methods are not adequate for secure data communication through cluster-based routing. Because the cluster head is changed at each round in cluster-based routing, it has to take the step of authentication or shared key setting with each member node. In addition, because most of previous key management mechanisms do not assign mobility(More)
  • 1