首页 | 本学科首页   官方微博 | 高级检索  
     


Wireless sensor network key management survey and taxonomy
Affiliation:1. State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an, China;2. Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada;3. Division of Communication Engineering, School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore;1. Department of Computer Science and Software Engineering, International Islamic University, Islamabad, Pakistan;2. School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China;3. Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China;4. Department of Mathematics, Ch. Charan Singh University, Meerut, Uttar Pradesh, India;5. School of Computing Science and Engineering, VIT University, Vellore, Tamilnadu 632014, India;6. National Institute of Telecommunications (Inatel), Santa Rita do Sapucaì, MG, Brazil;7. Instituto de Telecomunicações, Portugal;8. ITMO University, Saint Petersburg, Russia;9. University of Fortaleza (UNIFOR), Fortaleza, CE, Brazil;10. COMSATS University Islamabad, Sahiwal Campus, Pakistan;1. School of Computer Science and Technology, Anhui University, Hefei, 230039, China;2. Institute of Physical Science and Information Technology, Anhui University, Hefei, 230039, China;3. Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, 230039, China
Abstract:Wireless sensor networks (WSN) are mobile ad hoc networks in which sensors have limited resources and communication capabilities. Secure communications in some wireless sensor networks are critical. Key management is the fundamental security mechanism in wireless sensor network. Many key management schemes have been developed in recent years.In this paper, we present wireless sensor network key management survey and taxonomy. We classify proposed wireless sensor network key management schemes into three categories based on the encryption key mechanism. We then divide each category into several subcategories based on key pre-distribution and key establishment.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号