Research Article
A Study on High Secure and Efficient MANET Routing Scheme
Table 4
The efficiency comparison for each scheme.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
: one-time asymmetric encrypting/decrypting operation. : one-time symmetric encrypting/decrypting operation. : one-time one-way hash function operation. : one-time exclusive-OR operation. |