DOI QR코드

DOI QR Code

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Received : 2009.11.10
  • Accepted : 2010.02.24
  • Published : 2010.03.31

Abstract

Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

Keywords

Cited by

  1. Research on energy efficient fusion-driven routing in wireless multimedia sensor networks vol.2011, pp.1, 2011, https://doi.org/10.1186/1687-1499-2011-142
  2. Secure Group Communication in Wireless Sensor Networks: A survey vol.61, 2016, https://doi.org/10.1016/j.jnca.2015.10.011
  3. Convex optimization framework for intermediate deadline assignment in soft and hard real-time distributed systems vol.85, pp.10, 2012, https://doi.org/10.1016/j.jss.2012.04.050
  4. A Secure and Efficient Authentication Protocol in Wireless Sensor Network vol.81, pp.1, 2015, https://doi.org/10.1007/s11277-014-2115-2
  5. Dynamic key management in wireless sensor networks: A survey vol.36, pp.2, 2013, https://doi.org/10.1016/j.jnca.2012.12.010
  6. Sensor Communication Rate Control Scheme Based on Inference Game Approach vol.2015, 2015, https://doi.org/10.1155/2015/127349
  7. Mobile multimedia sensor networks: architecture and routing vol.2011, pp.1, 2011, https://doi.org/10.1186/1687-1499-2011-159
  8. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks vol.73, pp.2, 2013, https://doi.org/10.1016/j.jpdc.2012.10.004
  9. A probabilistic and opportunistic flooding algorithm in wireless sensor networks vol.35, pp.4, 2012, https://doi.org/10.1016/j.comcom.2011.11.016
  10. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks vol.16, pp.12, 2016, https://doi.org/10.3390/s16122204
  11. Dynamic Reconfigurable Hub as a Stationary Node in a Hybrid Sensor Network vol.9, pp.6, 2013, https://doi.org/10.1155/2013/484359
  12. A better-performing Q-learning game-theoretic distributed routing for underwater wireless sensor networks vol.14, pp.1, 2018, https://doi.org/10.1177/1550147718754728