Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

被引:7
|
作者
Szymoniak, Sabina [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 69, PL-42201 Czestochowa, Poland
关键词
Wireless sensors network; authentication protocols; key distribution protocols; security; INTERNET; SCHEME; PROTECTION; SECURE; MODEL;
D O I
10.1145/3638043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] A Survey on Localized Authentication Protocols for Wireless Sensor Networks
    Nesteruk, S. V.
    Kovalenko, V. Y.
    Bezzateev, S. V.
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [2] A survey of key distribution in wireless sensor networks
    Chen, Chi-Yuan
    Chao, Han-Chieh
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2495 - 2508
  • [3] Evaluation of Key Distribution Protocols for use with Wireless Sensor Networks
    Moeller, Stefan
    Newe, Thomas
    Lochmann, Steffen
    SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2009, : 25 - +
  • [4] A Survey on Key Distribution Schemes in Wireless Sensor Networks
    Liu, He
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ADVANCED ICT, (ICAICTE 2014), 2014, : 24 - 27
  • [5] Mobile node authentication using key distribution scheme in wireless sensor networks
    Shaila, K.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 12 (01) : 34 - 45
  • [6] Survey on Group Authentication in Wireless Sensor Networks
    Chaudhary, Khyati
    Shinde, Gitanjali
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [7] Sensor Authentication Scheme for Clustering Routing Protocols in Wireless Sensor Networks
    Lee, Saewoom
    Kim, Kiseon
    2010 IEEE SENSORS, 2010, : 1819 - 1822
  • [8] A Survey on Reliability Protocols in Wireless Sensor Networks
    Kafi, Mohamed Amine
    Ben Othman, Jalel
    Badache, Nadjib
    ACM COMPUTING SURVEYS, 2017, 50 (02)
  • [9] A survey on MAC protocols for wireless sensor networks
    Wang Mingfei
    Ci Linlin
    Zhan Ping
    Xu Yongjun
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3783 - 3786
  • [10] A Survey of Routing Protocols for Wireless Sensor Networks
    Jyotiprada, Amrita
    Sandhu, Navjeet
    Manivannan, D.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (02): : 139 - 166