Fig 2 - uploaded by Anan Phonphoem
Content may be subject to copyright.
Shared Key Authentication. 

Shared Key Authentication. 

Source publication
Article
Full-text available
To secure the communication in wireless network, the current standard provides the wired equivalent privacy (WEP) that encrypts the data by using, the encryption mechanism, RC4. This paper introduces two encryption brokers that are designed in the MAC layer. Because each data type needs the different security level, so these brokers provide the pac...

Similar publications

Article
Full-text available
Wireless secrecy is essential for communication confidentiality, health privacy, public safety, information superiority, and economic advantage in the modern information society. Contemporary security systems are based on cryptographic primitives and can be complemented by techniques that exploit the intrinsic properties of a wireless environment....
Article
Full-text available
The In wireless mobile ad hoc network, each node / junction is proficient of transfer message (information) with dynamism without constraint of any permanent infrastructure environment. Movable nodes commonly progress inside or outside from the entire network dynamically, building network topology unbalanced in mobile ad-hoc network (MANET). In a p...
Article
Full-text available
A growing number of utility companies are starting to use cellular wireless networks to transmit data in the smart grid. Consequently, millions of users' daily energy consumption data are sent by wireless smart meters. However, the broadcast transfer manner of wireless communication makes it naturally vulnerable to cyber attacks. Since smart meter...