Reference Hub7
A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks

Jianmin Chen, Jie Wu
ISBN13: 9781615207015|ISBN10: 1615207015|EISBN13: 9781615207022
DOI: 10.4018/978-1-61520-701-5.ch012
Cite Chapter Cite Chapter

MLA

Chen, Jianmin, and Jie Wu. "A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks." Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, edited by Hai Jin and Wenbin Jiang, IGI Global, 2010, pp. 262-289. https://doi.org/10.4018/978-1-61520-701-5.ch012

APA

Chen, J. & Wu, J. (2010). A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks. In H. Jin & W. Jiang (Eds.), Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice (pp. 262-289). IGI Global. https://doi.org/10.4018/978-1-61520-701-5.ch012

Chicago

Chen, Jianmin, and Jie Wu. "A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks." In Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, edited by Hai Jin and Wenbin Jiang, 262-289. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-701-5.ch012

Export Reference

Mendeley
Favorite

Abstract

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.