CFP last date
20 May 2024
Reseach Article

A Survey of Wireless Sensor Networks in Key Management Scheme

by Raju M, Selvan M, Lanitha B
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 11
Year of Publication: 2014
Authors: Raju M, Selvan M, Lanitha B
10.5120/15395-3892

Raju M, Selvan M, Lanitha B . A Survey of Wireless Sensor Networks in Key Management Scheme. International Journal of Computer Applications. 88, 11 ( February 2014), 12-15. DOI=10.5120/15395-3892

@article{ 10.5120/15395-3892,
author = { Raju M, Selvan M, Lanitha B },
title = { A Survey of Wireless Sensor Networks in Key Management Scheme },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 11 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number11/15395-3892/ },
doi = { 10.5120/15395-3892 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:07:50.532773+05:30
%A Raju M
%A Selvan M
%A Lanitha B
%T A Survey of Wireless Sensor Networks in Key Management Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 11
%P 12-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an entire study of Key Management Schemes for wireless sensor networks. Key management schemes (KMS) suggested in the literature, it is difficult for a warning network designer to learn exactly that KMS best connects in a certain WSN application. This review, that the KMS plays a important propose in determining the security performance of a WSN network with given application requirements and also develop a technique that changes the network designers to choose probably the almost suitable KMS for a particular WSN network setting. Broad reviews on the application requirements and the properties of altered key management schemes resolve each other and deal the problems on the present clearly-of-the-art research on the KMS for homogeneous networks to provide solutions for demonstrating link-layer keys in a variety of WSN applications and scenarios.

References
  1. R. Roman, J. Lopez, C. Alcaraz, H. Chen, SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks, in: 5th International Symposium on Security and Multimodality in Pervasive Environments (SMPE 2011), Singapore, 789–794, 2011.
  2. Y. Zhou, Y. Fang, Y. Zhang, Securing Wireless Sensor Networks: a Survey, IEEE Communications Surveys & Tutorials 10 (3) (2008) 6–28.
  3. W. Zhu, Y. Xiang, J. Zhou, R. Deng, F. Bao, Secure Localization with Attack Detection in Wireless Sensor Networks, International Journal of Information Security 10 (2011) 155–171.
  4. L. Eschenauer, V. Gligor, A Key-Management Scheme for Distributed Sensor Networks, in: 9th ACM Conference on Computer and communications Security (CCS), Washington, DC, USA, 41–47, 2002.
  5. W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, A. Khalili, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, ACM Transactions on Information and System Security (TISSEC) 8 (2) (2005) 228–258.
  6. S. Camtepe, B. Yener, Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, IEEE/ACM Transactions on Networking 15 (2) (2007) 346–358.
  7. D. Liu, P. Ning, Establishing Pairwise Keys in Distributed Sensor Networks, in: 10th ACM Conference on Computer and Communications Security (CCS), Washington D. C. , USA, 52–61, 2003.
  8. R. Anderson, C. Haowen, A. Perrig, Key Infection: Smart Trust for Smart Dust, 20 in: 12th IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, 206–215, 2004.
  9. A. Seshadri, M. Luk, A. Perrig, SAKE: Software Attestation for Key Establishment in Sensor Networks, in: Distributed Computing in Sensor Systems, vol. 5067 of LCNS, Springer Berlin / Heidelberg, 372–385, 2008.
  10. B. Panja, S. Madria, B. Bhargava, Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks, in: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1,Taichung, Taiwan, 2006.
  11. ZigBee Alliance, ZigBee-08006r03: ZigBee-2007 Layer PICS and Stack Profiles (ZigBee-PRO), Revision 3, http://www. zigbee. org/, Retrieved on December 2011, 2008.
  12. D. S. H. Chan, A. Perrig, Random Key Predistribution Schemes for Sensor Networks, in: 2003 IEEE Symposium on Security and Privacy, IEEE, Oakland, USA, 197–213, 2003.
  13. W. Zhang, M. Tran, S. Zhu, G. Cao, A Random Perturbation-based Scheme for Pairwise Key Establishment in Sensor Networks, in: 8th ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), Montreal, Canada, 90–99, 2007.
  14. M. Wen, Y. Zheng, W. Ye, K. Chen, W. Qiu, A Key Management Protocol with Robust Continuity for Sensor Networks, Computer Standards and Interfaces 31 (4) (2009) 642–647.
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Networks Key Management Network Design Security.