A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

Jianmin Chen, Jie Wu
DOI: 10.4018/978-1-61350-101-6.ch401
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.
Chapter Preview
Top

Cryptography Techniques Of Secure Manets/Wsns Design

Security is the combination of processes, procedures, and systems used to ensure confidentiality, authentication, integrity, availability, access control, and non-repudiation.

Complete Chapter List

Search this Book:
Reset