Authentic Vehicular Environment Using a Cluster Based Key Management

A method of determining the effectiveness of a sterilization cycle in a sterilization chamber by the use of an indicator containing DNA and a dye which can be bound thereto. The indicator containing DNA is placed in the sterilization chamber prior to the beginning of the sterilization cycle. When the DNA is subjected to heat and steam, the molecule is fragmented so that it is no longer capable of binding the dye. The DNA is withdrawn from the indicator after the sterilization cycle, contacted by a solution of the dye and, thereafter, dipped into wash water. If sufficient fragmentation has taken place, a substantial percentage of the dye will be washed off during the second dip. This is easily recognized by the operator and the efficacy of the cycle can be determined. On the other hand, if insufficient heat and steam has been applied, the remaining DNA will retain the dye and little or no change in color will be observed. In such a case, the operator will immediately recognize that the sterilization cycle was ineffective.

[1]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[2]  S. Sivagurunathan,et al.  Securing Mobile Ad Hoc Networks through AntTree Clustering and Threshold Cryptography , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.

[3]  Melbourne Barton,et al.  Efficient flooding with passive clustering-an overhead-free selective forward mechanism for ad hoc/sensor networks , 2003 .

[4]  Vaduvur Bharghavan,et al.  Routing in ad-hoc networks using minimum connected dominating sets , 1997, Proceedings of ICC'97 - International Conference on Communications.

[5]  Hisham Dahshan,et al.  Key Management in Web of Trust for Mobile Ad Hoc Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[6]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[7]  Tomoyuki Ohta,et al.  An adaptive multihop clustering scheme for highly mobile ad hoc networks , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..

[8]  Charalampos Konstantopoulos,et al.  Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction , 2008, Comput. Networks.

[9]  Mahmoud Naghshineh,et al.  PARO: Supporting Dynamic Power Controlled Routing in Wireless Ad Hoc Networks , 2003, Wirel. Networks.

[10]  Taieb Znati,et al.  A mobility-based framework for adaptive clustering in wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[11]  Sung-Ju Lee,et al.  Ad hoc wireless multicast with mobility prediction , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[12]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[13]  Soyoung Park,et al.  Reliable Traffic Information Propagation in Vehicular Ad-Hoc Networks , 2008, 2008 IEEE Sarnoff Symposium.

[14]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[15]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[16]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[17]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[18]  Prithwish Basu,et al.  A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.

[19]  Peng Liu,et al.  Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[20]  I. Sasase,et al.  On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[21]  Thomas Nowey,et al.  Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[22]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.