A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. In this paper, we have proved that the Multiple Key Protocol (MKP) can be used within CTR mode to increase the size of the transferred message. Also, we have showed that the DMAC algorithm is able to decrease the time of authentication operation on multi-processing units system.
 Lei, J., et al. (2007) Comparative Studies on Authentication and Key Exchange Methods for 802.11 Wireless LAN. Computers & Security, 26, 401-409. http://dx.doi.org/10.1016/j.cose.2007.01.001
 IEEE Inc. (2003) IEEE 802.15.3 Working Group—Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN). IEEE Draft Standard.
 Al-Alak, S., et al. (2013) Randomness Improvement of AES Using MKP. Research Journal of Information Technology, 5, 24-34. http://dx.doi.org/10.3923/rjit.2013.24.34
 Al-Alak, S., et al. (2012) Authentication Time of IEEE 802.15.4 with Multiple-Key Protocol Using Distributed Message Authentication Code Algorithm. Research Journal of Information Technology, 4, 140-154.
 Schneier, B. (1993) The Idea Encryption Algorithm-The International Data Encryption Algorithm (IDEA) May Be One of the Most Secure Block Algorithms Available to the Public Today. Bruce Examines Its 128-Bit-Long Key. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 18, 50-57.
 Koblitz, N. (1987) Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209.
 Vanstone, S.A. (2003) Next Generation Security for Wireless: Elliptic Curve Cryptography. Computers & Security, 22, 412-415. http://dx.doi.org/10.1016/S0167-4048(03)00507-8
 Kirlar, B.B. (2011) On the Elliptic Curves y2 = x3 － c with Embedding Degree One. Journal of Computational and applied Mathematics, 235, 4724-4728.
 Edoh, K.D. (2004) Elliptic Curve Cryptography: Java Implementation. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, 8 October 2004, 88-93.
 LAN/MAN, S.C. (2006) IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements--Part 15.4: Wireless MAC and PHY Specifications for Low-Rate WPANs. Control, 1-203.