首页 | 本学科首页   官方微博 | 高级检索  
     


A survey of key management schemes in wireless sensor networks
Affiliation:1. Department of Computer Science, University of Alabama, Tuscaloosa, AL 35487, USA;2. XINOPT Co., 6421 brightlea dr, lanham, MD 20706, USA;3. Department of Computer Science, Lamar University, Beaumont, TX 77710, USA;4. Department of Computer Science, North Dakota State University, Fargo, ND 58105, USA;5. Computer Engineering Department, Rochester Institute of Technology, Rochester, NY 14623, USA;1. LI-PaRAD, Université Paris Saclay, University of Versailles Saint-Quentin-en-Yvelines, France;2. LASE, University of Ngaoundere, Cameroon;3. FS, University of Maroua, Cameroon;4. STIC, University of Tlemcen, Algeria;1. Department of Information Engineering, University of Parma, Italy;2. Guglielmo Srl, Pilastro di Langhirano, Parma, Italy;1. School of Computer Science and Technology, Anhui University, Hefei, 230039, China;2. Institute of Physical Science and Information Technology, Anhui University, Hefei, 230039, China;3. Anhui Engineering Laboratory of IoT Security Technologies, Anhui University, Hefei, 230039, China;1. Department of Mathematics, Agra College, Agra, Uttar Pradesh, India;2. Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia;3. School of Computer Science, Oklahoma University, USA;1. Department of Information & Communication Systems, Hohai University, Changzhou, China;2. Changzhou Key Laboratory of Sensor Networks and Environmental Sensing, Changzhou, China;3. College of Electronic Information and Computer, Guangdong University of Petrochemical Technology, China;4. School of Computer Science and Engineering, Beihang University, Beijing, China;5. Institute of Computer Science and Information Engineering, Taiwan;6. Department of Electronic Engineering, National Ilan University, I-Lan, Taiwan;7. Department of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan;1. STIC, University of Tlemcen, Algeria;2. LaRI, University of Maroua, Cameroon;3. LI-PaRAD, Université Paris Saclay, University of Versailles Saint-Quentin-en-Yvelines, France
Abstract:Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these networks. Sensor nodes used to form these networks are resource-constrained, which make security applications a challenging problem. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques have been designed to address the tradeoff between limited memory and security, but which scheme is the most effective is still debatable. In this paper, we provide a survey of key management schemes in wireless sensor networks. We notice that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号