ABSTRACT
much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our
public-key management scheme: creation of public (and private) keys, issuing public-key certificates, storage of
certificates, and key authentication by the nodes themselves without the control of any principal authority. More
over the public key management scheme serves as an underlying mechanism for both key distribution and
establishing security relationships between nodes.
Keywords: - Mobile Adhoc Network, Ubiquitous, Public key, Assail ability, Misbehaving Users.