A Survey of Key Management Schemes for Large Scale Wireless Sensor Networks

التفاصيل البيبلوغرافية
العنوان: A Survey of Key Management Schemes for Large Scale Wireless Sensor Networks
المؤلفون: Vipin Kumar, Navneet Malik
المصدر: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS).
بيانات النشر: IEEE, 2021.
سنة النشر: 2021
مصطلحات موضوعية: Authentication, business.industry, Computer science, Node (networking), Hash function, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Encryption, 020202 computer hardware & architecture, Diffie–Hellman key exchange, 0202 electrical engineering, electronic engineering, information engineering, business, Key management, Wireless sensor network, Computer network
الوصف: Sensor monitoring systems are used in a variety of scenarios, from environment data collection to industrial processing and healthcare. Military activities in hostile areas also depend on these networks, so security is the fundamental mechanism of these networks. To maintain the confidentiality of transmitted data and authentication of node cryptographic techniques, they have an essential requirement of keys. In hashing, encryption and decryption, the importance of keys cannot be overstated. Manage the keys to a vary big number of sensor nodes it a non-trivial task. Key managements include the generate and securely distribute the key to every node. It also includes revoke the keys from compromise nodes in case of any attack and assign the keys to a newly deployed node after an interval. Key refresh after regular interval enhances the network’s security and is also the part of key management. Traditional key management technique like diffie hellman and Due to small processing and computing capacity, RSA cannot be used in sensor networks. A single key management may not fulfil all the requirements of an application, so to select the appropriate scheme for an application is also a difficult task. For large sensor networks, a variety of key control schemes have been suggested. We examine state of art key scheme and study the properties of these schemes.
DOI: 10.1109/icaccs51430.2021.9441849
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::832e614cb19699c0c288739755097b6e
https://doi.org/10.1109/icaccs51430.2021.9441849
Rights: CLOSED
رقم الانضمام: edsair.doi...........832e614cb19699c0c288739755097b6e
قاعدة البيانات: OpenAIRE
الوصف
DOI:10.1109/icaccs51430.2021.9441849