A REVIEW ON KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS

Prashant Gautam, Navdeep Kaur Saluja

Abstract


Wireless sensor networks are distributed wireless multi-hop networks of tiny low-cost and low-performance devices called nodes or motes. They are used to monitor some physical phenomenon, such as humidity, temperature, pressure, movement, light and so on, and to communicate measured data. They are often deployed in previously unknown and physically unsecured environments. The requirements on processing speed, memory, communication, lifetime of a node and security differ for each application and thus leave different amount of resources to provide security with. However, most cryptographic solutions, both symmetric and asymmetric, are based on some secret keys. Consequently, these keys are established and managed by a key management scheme (KMS). Based on the application, specific restrictions and relaxations are made on KMS. In this paper, study of a specific type of KMS has been done.


Keywords


wireless sensor network, key management scheme, key distribution, Cryptography.

Full Text:

PDF

References


REFERENCES

S.Marti, T.Giuli, K.Lai, and M.Baker, (2000), "Mitigating routing misbehavior in mobile ad hoc networks”, Proc. ACM International Conference on Mobile Computing and Networking, pp. 255–265.

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway, (2007), "A survey of key management schemes in wireless sensor networks". Science direct, Computer Communications, pp. 2314–2341.

K.Kim, Y.Zhang, W.Yang, and M.Park, (2008), "An authentication protocol for hierarchy-based wireless sensor networks", in Proc. IEEE International Symposium on Computer and Information Sciences, pp. 1–6.

Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, and Michael Galloway, (2007), "A survey of key management schemes in wireless sensor networks". Science direct, Computer Communications, pp. 2314–2341.

Mohammed A. Abuhelaleh, and Khaled M. Elleithy, (2010), “Security in WSN: Jey Management Module SOOAWSN”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, pp. 67-78.

Ritu Sharma, Yogesh Chaba, and Yudhvir Singh, (2010), "An IPC Key Management Scheme for Wireless Sensor Network, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), pp. 251-255.

Yuan Zhang, Yongluo Shen, and SangKeun Lee, (2010), "A Cluster-Based Group Key Management Scheme forWireless Sensor Networks", 2010 12th International Asia-Pacific Web

Conference, pp. 386-388.

Y. Sun; W. Trappe; K.J.Ray Liu,“An efficient key management scheme for secure wireless multicast,” Proc. of IEEE International Conference on Communication, pp. 1236 –1240, May 2002.

Gupta, G., Younis, M. 2003. Load-balanced clustering of wireless sensor networks. IEEE International Conference on Communications, 2003. ICC '03., vol.3, no., pp. 1848-1852 vol.3, 11-15 May 2003.

R. Srinivasan,,” Secure Group Key Management Scheme for Multicast Networks,” International Journal of Network Security, Vol.11, No.1, PP.33-38, July 2010.

Harjot Bawa, Parminder Singh and Rakesh Kumar "An Efficient Novel Key management scheme using NchooseK algorithm for Wireless Sensor Networks"International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.6, November 2012.

Khawla Naji Shnaikat and Ayman Ahmed AlQudah " KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS", International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, PP.49-63, November 2014.


Refbacks

  • There are currently no refbacks.