Identity-based key management in mobile ad hoc networks: techniques and applications
FREE-DOWNLOAD E Da Silva, A Dos Santos… – Wireless …, 2008 –
. Poor physical security is another issue. Mobile nodes are not limited to a room. . The
identity-based authentication and key exchange (IDAKE) scheme [10] consists of two
techniques: a basic MANET-IDAKE and a fully self-organized MANET-IDAKE.