scholarly journals Concept of ADSR for Mobile AdHoc Networks/Wireless Sensor Networks

2017 ◽  
Vol 2 (1) ◽  
Author(s):  
Saurabh Mishra ◽  
Sandip Vijay

Wireless AdHoc and sensor networks are very broadly used in many remote applications. AdHoc networks still have problems in conveying data from one node to other node. This problem further increases with the mobile nodes. Now a days different routing algorithms are being developed for mobile wireless AdHoc networks. In this paper, some of them are discussed. Mobile Ad hoc networks and Mobile Wireless Sensor Networks are similar to each other as both depend on hop-to-hop routing. So, protocols developed for Mobile ad-hoc networks are also used in many Mobile sensor applications. In this paper Angle based DSR is discussed, which is developed for Mobile AdHoc networks or mobile Wireless Sensor Networks and derived from changes done in DSR, which was developed for MANETs. Moto of this paper is to give an idea that other protocols which were developed for MANETs can be completely used in Mobile WSNs, by having angle-based mechanism, as described in ADSR.

2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Author(s):  
Lei Zhang ◽  
Chih-Cheng Chang ◽  
Danfeng Yao

This chapter presents the technical challenges and solutions in securing wireless networks, in particular infrastructure-less wireless networks such as mobile ad hoc networks and wireless sensor networks. Communications in infrastructure-less wireless networks are challenging, as there are no trusted base stations to coordinate the activities of mobile hosts. Applied cryptographic tools, in particular threshold cryptography, play an important role in the trust establishment, message security, and key management in such networks. We describe several technical approaches that integrate applied cryptography techniques into mobile ad hoc networks and wireless sensor networks. We also outline several research directions in these areas.


Sign in / Sign up

Export Citation Format

Share Document