Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

被引:7
作者
Szymoniak, Sabina [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 69, PL-42201 Czestochowa, Poland
关键词
Wireless sensors network; authentication protocols; key distribution protocols; security; INTERNET; SCHEME; PROTECTION; SECURE; MODEL;
D O I
10.1145/3638043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] A Survey on Localized Authentication Protocols for Wireless Sensor Networks
    Nesteruk, S. V.
    Kovalenko, V. Y.
    Bezzateev, S. V.
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [2] A survey of key distribution in wireless sensor networks
    Chen, Chi-Yuan
    Chao, Han-Chieh
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2495 - 2508
  • [3] A Survey on Key Distribution Schemes in Wireless Sensor Networks
    Liu, He
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ADVANCED ICT, (ICAICTE 2014), 2014, : 24 - 27
  • [4] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [5] A survey on authentication protocols of dynamic wireless EV charging
    Hettiarachchi, Nethmi
    Hakak, Saqib
    Mandal, Kalikinkar
    COMPUTER COMMUNICATIONS, 2025, 230
  • [6] Survey on key revocation mechanisms in wireless sensor networks
    Ge, Mengmeng
    Choo, Kim-Kwang Raymond
    Wu, Huai
    Yu, Yong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 : 24 - 38
  • [7] Dynamic key management in wireless sensor networks: A survey
    He, Xiaobing
    Niedermeier, Michael
    de Meer, Hermann
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 611 - 622
  • [8] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [9] Key management schemes and protocols for wireless sensor networks
    Su, Zhong
    Lin, Chuang
    Feng, Fu-Jun
    Ren, Feng-Yuan
    Ruan Jian Xue Bao/Journal of Software, 2007, 18 (05): : 1218 - 1231
  • [10] Independent Key Distribution Protocols for Broadcast Authentication
    Bezawada, Bruhadeshwar
    Kulkarni, Sandeep
    Ray, Indrajit
    Ray, Indrakshi
    Li, Rui
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 27 - 38