Blessey Prem - Profile on Academia.edu (original) (raw)

Gaurav Sharma related author profile picture

Raghu Vamsi Potukuchi related author profile picture

Gaurav Sharma related author profile picture

Abdelfettah Belghith related author profile picture

Abderrahmen Guermazi related author profile picture

Ioannis Krontiris related author profile picture

Salahddine Krit related author profile picture

Jalal Laassiri related author profile picture

Manoj Ramchandran related author profile picture

Bo Sun related author profile picture

Uploads

Papers by Blessey Prem

Research paper thumbnail of Secure Information Transmission and Retrieval Using Key Management in Wireless Sensor Network

Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect,... more Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect, and distribute information in numerous applications [1]. As sensor networks become pervasive, security is exposed to several attacks such as Sybil attack, network eavesdropping, masquerade attack, etc. For secure communication between the nodes, secret key cryptosystem is used. To deliver data in a secure manner without being compromised by an adversary, WSN provides secure communication and key distribution. Key management schemes have been established to achieve security. The tradeoff between the security and the connectivity is explained in each key management scheme. By this survey, it helps us to know the schemes that detect attacks and prevent it. As we recuperate the merits and demerits of the schemes are analyzed. Moreover, the techniques and methods used have been summarized.

Research paper thumbnail of Secure Information Transmission and Retrieval Using Key Management in Wireless Sensor Network

Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect,... more Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect, and distribute information in numerous applications [1]. As sensor networks become pervasive, security is exposed to several attacks such as Sybil attack, network eavesdropping, masquerade attack, etc. For secure communication between the nodes, secret key cryptosystem is used. To deliver data in a secure manner without being compromised by an adversary, WSN provides secure communication and key distribution. Key management schemes have been established to achieve security. The tradeoff between the security and the connectivity is explained in each key management scheme. By this survey, it helps us to know the schemes that detect attacks and prevent it. As we recuperate the merits and demerits of the schemes are analyzed. Moreover, the techniques and methods used have been summarized.

Log In