A survey and taxonomy of symmetric key management schemes for wireless sensor networks (original) (raw)

A survey in Wireless Sensor Networks based on Key Management Schemes

Wireless Sensor Networks (WSNs) consist of a set of small devices, called the sensor nodes, with sensing and wireless communication capabilities. They are used in many applications such as military, ecological, and health-related areas. WSNs may include certain constraints like low computation capability, limited energy resources, small memory and poor resilience to physical capture. Also, sensor nodes are mostly deployed in potentially adverse or even in hostile environment. These constraints and issues make security in WSNs a challenge. So, efficient key distribution and management schemes are must. To address the trade-off between above listed constraints and security, many key establishment techniques have been established. In this paper, the need for cryptographic schemes in key management and a comparison study between symmetric key and public key cryptographic schemes has been presented. Also, a survey on various key management schemes and a brief comparison among them is depicted. It is noticed that no key distribution technique is ideal to all scenarios where WSNs are used and the techniques employed should depend upon the requirements of the target applications and resources of each individual sensor network.

A Review on Key Management Scheme for Wireless Sensor Networks

2015

Wireless sensor networks are distributed wireless multi-hop networks of tiny low-cost and low-performance devices called nodes or motes. They are used to monitor some physical phenomenon, such as humidity, temperature, pressure, movement, light and so on, and to communicate measured data. They are often deployed in previously unknown and physically unsecured environments. The requirements on processing speed, memory, communication, lifetime of a node and security differ for each application and thus leave different amount of resources to provide security with. However, most cryptographic solutions, both symmetric and asymmetric, are based on some secret keys. Consequently, these keys are established and managed by a key management scheme (KMS). Based on the application, speciļ¬c restrictions and relaxations are made on KMS. In this paper, study of a specific type of KMS has been done.

A Key Management Scheme in Wireless Sensor Networks Using Symmetric and Asymmetric Key Cryptography

Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.

A Taxonomy of Key Management Schemes of Wireless Sensor Networks

Research on secure key management in Wireless Sensor Networks (WSNs) using cryptography has gained significant attention in the research community. However, ensuring security with public key cryptography is a challenging task due to resource limitation of sensor nodes in WSNs. In recent years, numerous researchers have proposed efficient lightweight key management schemes to establish secure communication. In this paper, the authors provide a study on several key management schemes developed for WSNs and their taxonomy with respect to various network and security metrics.

A survey of key management schemes in wireless sensor networks

Computer Communications, 2007

Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these networks. Sensor nodes used to form these networks are resource-constrained, which make security applications a challenging problem. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques have been designed to address the tradeoff between limited memory and security, but which scheme is the most effective is still debatable. In this paper, we provide a survey of key management schemes in wireless sensor networks. We notice that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.

Classification of Symmetric Key Management Schemes for Wireless Sensor Networks

WSN is the collection of thousands of tiny sensor nodes, which have the capability of sensing, computing and transmitting the information in the network. Due to the low circuit design, it has some resource constraints but efficient to carry the information through wireless communication. But the exchange of information in a secure manner is critical in WSN. There are many techniques developed in recent years for the security purposes, one of the area is the key management. Key management is the challenging issue in sensor networks. In this paper we present the key management techniques for wireless sensor networks and classification has been presented based on the encryption techniques.

CUBE--A Survey and Taxonomy of Symmetric Key Management scheme for WSN

WSN is the collection of thousands of tiny sensor nodes which have the capability of sensing, computing and transmitting the information in the network. Due to the low circuit design, it has some resource constraints but still efficient to carry the information through wireless communication. The exchange of information in a secure manner is critical in WSN. There are many techniques developed in recent years for the security purposes, one of the core areas is the key management. Key management is a challenging issue in sensor networks. In this paper classification of key management techniques for wireless sensor networks based on the encryption techniques has been presented. Also the open issues in this area are focused.

Key Management Techniques in Wireless Sensor Networks

International Journal of Network Security & Its Applications, 2014

Wireless sensor networks are visualized in military, medicinal services applications and business, where the data at these filed is very important. Security of the information in the system relies on the cryptographic strategy and the techniques in which encryption and decryption keys are built up among the nodes. Dealing with the keys in the system incorporates node validation, key understanding and key refresh stages which represents an extra overhead on system assets. Both Symmetric and Asymmetric key methods when connected independently in WSN neglects to give a design reasonable to extensive variety of utilizations.

Secure and efficient key management scheme for wireless sensor networks

2011 3rd International Conference on Electronics Computer Technology, 2011

Taking into account the current developments and increased application of wireless sensor networks, it has become increasingly important to pay greater attention to the security of wireless sensor networks which is more prone to threats than compared to wired networks . We have proposed a highly secure and efficient scheme for wireless sensor networks. We have designed a key management technique to ensure maximum security of the wireless sensor network and also of every individual node subject to various hostile environments and situations.

A Novel Key Management Scheme for Wireless Sensor Networks

2015

The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by Key management plays a fundamental role in cryptography is to provide confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number of cryptographic keys, ultimately secured through trust in hardware or software by physical isolation or procedural controls. This paper presents a simple, efficient and secure scheme for key generation, distribution and storage for wireless sensor networks. The proposed algorithm is simulated using Matlab and compared with standard key management algorithm. The Proposed Algorithm shows that the delivery of rekeying messages reduces the communication of rekeying messages by ...