Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hash chain

Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice
It is generated by a successive application of a hash function to a string. Due to the one-way property of secure hash functions, it is impossible to reverse the hash function. A hash chain is a method to produce many one-time keys from a single key, and keys are used in the reversed order of generation.
Published in Chapter:
A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks
Jianmin Chen (Florida Atlantic University, USA) and Jie Wu (Florida Atlantic University, USA)
DOI: 10.4018/978-1-61520-701-5.ch012
Abstract
Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR