A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

Jianmin Chen, Jie Wu
ISBN13: 9781613501016|ISBN10: 1613501013|EISBN13: 9781613501023
DOI: 10.4018/978-1-61350-101-6.ch401
Cite Chapter Cite Chapter

MLA

Chen, Jianmin, and Jie Wu. "A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks." Wireless Technologies: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 864-892. https://doi.org/10.4018/978-1-61350-101-6.ch401

APA

Chen, J. & Wu, J. (2012). A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks. In I. Management Association (Ed.), Wireless Technologies: Concepts, Methodologies, Tools and Applications (pp. 864-892). IGI Global. https://doi.org/10.4018/978-1-61350-101-6.ch401

Chicago

Chen, Jianmin, and Jie Wu. "A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks." In Wireless Technologies: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 864-892. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-101-6.ch401

Export Reference

Mendeley
Favorite

Abstract

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.