Security and Improvement of Aggregate Signature Scheme for Underwater Wireless Sensor Networks and Certificateless Aggregate Signature Scheme for Vehicular Ad Hoc Networks

Author(s):  
Xiaoming Hu ◽  
Wenan Tan ◽  
Jihong Yan ◽  
Chuang Ma
2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Author(s):  
Phan Cong-Vinh

In mobile environments (MEs) such as vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and so on, formal specification of self-configuring P2P networking (SPN) emerges as a need for programming, and verifying such mobile networks. Moreover, well-specified SPN in MEs becomes a requirement of developing middleware for the mobile networks. The chapter is a reference material for readers who already have a basic understanding of the MEs for their applications and are now ready to know how to specify and verify formally aspect-oriented self-configuring P2P networking (ASPN) in MEs using categorical language, assured that their computing needs are handled correctly and efficiently. ASPN in MEs is presented in a straightforward fashion by discussing in detail the necessary components and briefly touching on the more advanced components. Several explanatory notes and examples are represented throughout the chapter as a moderation of the formal descriptions. Significant properties of ASPN in MEs, which emerge from the specification, create the firm criteria for verification.


Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Sign in / Sign up

Export Citation Format

Share Document