Research Article

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

Figure 1

Selection of strong and weak nodes.