c) Authentication: It ensures that
communication from one node to other is
genuine. Only legitimate users can access
the system and services. Two used
systems are 'open system' and 'shared
key'.
(d) Availability: Availability ensures the service
offered by node will be available to its users
when expected, in spite of attacks. Also
only legitimate users can access data
anytime.
Copyright © 2026 eLLeNow.com All Rights Reserved.