CFP last date
22 April 2024
Reseach Article

An Empirical Study on Key Management Schemes of Wireless Sensor Network

by Nazmul Islam, M. A. Moyeen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 11
Year of Publication: 2016
Authors: Nazmul Islam, M. A. Moyeen
10.5120/ijca2016908118

Nazmul Islam, M. A. Moyeen . An Empirical Study on Key Management Schemes of Wireless Sensor Network. International Journal of Computer Applications. 134, 11 ( January 2016), 30-34. DOI=10.5120/ijca2016908118

@article{ 10.5120/ijca2016908118,
author = { Nazmul Islam, M. A. Moyeen },
title = { An Empirical Study on Key Management Schemes of Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 11 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number11/23960-2016908118/ },
doi = { 10.5120/ijca2016908118 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:57.749601+05:30
%A Nazmul Islam
%A M. A. Moyeen
%T An Empirical Study on Key Management Schemes of Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 11
%P 30-34
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess most significant key management schemes of wireless sensor networks e.g. single network-wide key scheme, pairwise key establishment scheme, random key pre-distribution and Q-composite random key pre-distribution scheme. The overall analysis is performed based on a number of criteria such as: loaded key utilization, resource consumption and rigidity against node capture. Besides, to identify the best one, a result based comparison among the schemes is also presented.

References
  1. Raghavendra, C.S., Sivalingam, K.M. and Znati, T. eds., 2006. Wireless sensor networks. Springer.
  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. Communications magazine, IEEE, 40(8), 102-114.
  3. El-Aaasser, M., & Ashour, M. (2013, January). Energy aware classification for wireless sensor networks routing. In Advanced Communication Technology (ICACT), 2013 15th International Conference on (pp. 66-71). IEEE.
  4. Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer communications, 30(11), 2314-2341.
  5. Barbareschi, M., Battista, E., Mazzeo, A., & Venkatesan, S. (2014, August). Advancing WSN physical security adopting TPM-based architectures. In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on (pp. 394-399). IEEE.
  6. Ho, J. W. (2010). Distributed detection of node capture attacks in wireless sensor networks. INTECH Open Access Publisher.
  7. Hartung, C., Balasalle, J., & Han, R. (2005). Node compromise in sensor networks: The need for secure systems. Department of Computer Science University of Colorado at Boulder.
  8. Zhang, J., & Varadharajan, V. (2010). Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2), 63-75.
  9. Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. Wireless Communications, IEEE Transactions on, 12(2), 948-959.
  10. Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. Computers, IEEE Transactions on, 62(11), 2224-2237.
  11. Abdallah, W., Boudriga, N., Kim, D., & An, S. (2014, February). An efficient and scalable key management mechanism for wireless sensor networks. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 687-692). IEEE.
  12. Sun, D., & He, B. (2006). Review of key management mechanisms in wireless sensor networks. Acta Automatica Sinica, 32(6), 900.
  13. Eschenauer, L., & Gligor, V. D. (2002, November). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 41-47). ACM.
  14. Di Ying, B., Makrakis, D., & Mouftah, H. T. (2014). Anti-traffic analysis attack for location privacy in WSNs. EURASIP Journal on Wireless Communications and Networking, 2014(1), 1-15.
  15. Merkle, R. C. (1978). Secure communications over insecure channels. Communications of the ACM, 21(4), 294-299.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor network key management security performance evaluation.