Challenges and Surveys in Key Management and Authentication Scheme for Wireless Sensor Networks

Lalitha, T.; Uma rani, R.
June 2014
Australian Journal of Basic & Applied Sciences;2014 Special, Vol. 8 Issue 8, p105
Academic Journal
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this paper, we develop a cluster based technique for key management in wireless sensor network.


Related Articles

  • Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey. LABRAOUI, NABILA; GUERROUI, MOURAD; ALIOUAT, MAKHLOUF; ZIA, TANVEER // Adhoc & Sensor Wireless Networks;2011, Vol. 12 Issue 3/4, p295 

    No abstract available.

  • Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks. Yin, Aihan; Liang, Hongchao // Wireless Personal Communications;Feb2015, Vol. 80 Issue 3, p1049 

    Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we propose a hybrid signcryption scheme...

  • A Key Distribution and Management Scheme for Hierarchical Wireless Sensor Network. Abdullah, Ibrahim // International Journal of Multimedia & Ubiquitous Engineering;2011, Vol. 6 Issue 3, p1 

    The nodes of Wireless Sensor Networks (WSNs) are deployed in hostile environments faces the security problem of eavesdropping and capturing by an adversary. To achieve the security of this resource constraint device is a challenging task. This paper proposed a secured key management scheme for...

  • A Survey on Prevention Approaches for Denial of Sleep Attacks in Wireless Networks. Mahalakshmi, G.; Subathra, P. // Journal of Emerging Technologies in Web Intelligence;Feb2014, Vol. 6 Issue 1, p106 

    Wireless sensor network is vulnerable to various attacks due to the deployment in hostile environment. Among various types of security threats, low power sensor nodes are affected by the attacks that cause random drainage of the energy level of sensors. It leads to the death of nodes. The denial...

  • Is PKI finally securing its future? Braue, David // Australian Personal Computer;Jul2001, Vol. 22 Issue 7, p121 

    Focuses on the adoption of public key infrastructure (PKI) technology. Facilitation of encryption and decryption of information for the purpose of sending it securely across the Internet; Combination of the public key with a unique digital signature issued by a certification authority; Single...

  • WEP ENCRYPTION ON WIRELESS NETWORKS. Cvejić, Radoje; Vasev, Aleksandar; Stefanovic, Slobodan // Metalurgia International;2013 Special Issue Nr. 4, Vol. 18, p200 

    An assessment of the insecurity characteristics of an isolated wireless network is based on outside influence of compositing facilities, meteorological conditions, human intelligence and ability to influence the network directly or indirectly, depending on the used methods. Based on the adopted...

  • Proactive Threshold Cryptosystem for EPC Tags. GARCIA-ALFARO, J.; BARBEAU, M.; KRANAKIS, E. // Adhoc & Sensor Wireless Networks;2011, Vol. 12 Issue 3/4, p187 

    No abstract available.

  • Cyber Security for Smart Grid, Cryptography, and Privacy. Iyer, Swapna // International Journal of Digital Multimedia Broadcasting;2011, p1 

    The invention of "smart grid" promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will...

  • A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS. MADHAV, KUTHADI VENU; RAJENDRA. C; SELVARAJ, RAJA LAKSHMI // Journal of Theoretical & Applied Information Technology;2010, Vol. 20 Issue 1, p39 

    Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. The sensor networks depend upon the sensed data, which may depend upon the application. One of the major...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics