Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Scientific Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Key

Handbook of Research on Wireless Security
A set of values that a cryptographic algorithm operates on
Published in Chapter:
A Survey of Key Management in Mobile Ad Hoc Networks
Bing Wu (Fayetteville State University, USA), Jie Wu (Florida Atlantic University, USA), and Mihaela Cardei (Florida Atlantic University, USA)
Copyright: © 2008 |Pages: 21
DOI: 10.4018/978-1-59904-899-4.ch030
Abstract
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and nonrepudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, and so forth. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node’s available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this chapter, we present a survey of the research work on key management in MANETs according to recent literature.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Full Text Chapter Download: US $37.50 Add to Cart
Challenges in FPGA Technology Paradigm for the Implementation of IoT Applications
Group of bits which plays a vital role in decryption and encryption. It is information stored in cipher which is known only to sender/receiver.
Full Text Chapter Download: US $37.50 Add to Cart
Particle Swarm Optimization-Based Session Key Generation for Wireless Communication (PSOSKG)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into cipher text, or vice versa during decryption.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR