Blessey Prem | Anna University (original) (raw)

Uploads

Papers by Blessey Prem

Research paper thumbnail of Secure Information Transmission and Retrieval Using Key Management in Wireless Sensor Network

Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect,... more Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect, and distribute information in numerous applications [1]. As sensor networks become pervasive, security is exposed to several attacks such as Sybil attack, network eavesdropping, masquerade attack, etc. For secure communication between the nodes, secret key cryptosystem is used. To deliver data in a secure manner without being compromised by an adversary, WSN provides secure communication and key distribution. Key management schemes have been established to achieve security. The tradeoff between the security and the connectivity is explained in each key management scheme. By this survey, it helps us to know the schemes that detect attacks and prevent it. As we recuperate the merits and demerits of the schemes are analyzed. Moreover, the techniques and methods used have been summarized.

Research paper thumbnail of Secure Information Transmission and Retrieval Using Key Management in Wireless Sensor Network

Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect,... more Wireless sensor networks (WSNs) distribute nodes with the limited capabilities to sense, collect, and distribute information in numerous applications [1]. As sensor networks become pervasive, security is exposed to several attacks such as Sybil attack, network eavesdropping, masquerade attack, etc. For secure communication between the nodes, secret key cryptosystem is used. To deliver data in a secure manner without being compromised by an adversary, WSN provides secure communication and key distribution. Key management schemes have been established to achieve security. The tradeoff between the security and the connectivity is explained in each key management scheme. By this survey, it helps us to know the schemes that detect attacks and prevent it. As we recuperate the merits and demerits of the schemes are analyzed. Moreover, the techniques and methods used have been summarized.

Log In