Research Article

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

Figure 2

Phase 1: selection of child nodes.