scholarly journals Secure autoconfiguration and public-key distribution for Mobile Ad-hoc Networks

Author(s):  
Hongbo Zhou ◽  
Matt W. Mutak ◽  
Lionel M. Ni
2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


2013 ◽  
Author(s):  
Haifeng Lin ◽  
Anna Jiang ◽  
Di Bai ◽  
Yunfei Liu

Sign in / Sign up

Export Citation Format

Share Document