Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

被引:7
作者
Szymoniak, Sabina [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 69, PL-42201 Czestochowa, Poland
关键词
Wireless sensors network; authentication protocols; key distribution protocols; security; INTERNET; SCHEME; PROTECTION; SECURE; MODEL;
D O I
10.1145/3638043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.
引用
收藏
页数:31
相关论文
共 50 条
  • [21] A Survey on Conventional and Secure Routing Protocols in Wireless Sensor Networks
    Sreenivasulu, A. L.
    Reddy, P. Chenna
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 467 - 478
  • [22] Routing protocols in wireless body sensor networks: A comprehensive survey
    Zuhra, Fatima Tul
    Abu Bakar, Kamalrulnizam
    Ahmed, Adnan
    Tunio, Mohsin Ali
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 99 : 73 - 97
  • [23] A Comprehensive Survey of Congestion Control Protocols in Wireless Sensor Networks
    Sergiou, Charalambos
    Antoniou, Pavlos
    Vassiliou, Vasos
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) : 1839 - 1859
  • [24] A Survey of Authentication Protocols in VANET
    Chen, Chin-Ling
    Chen, Yue-Xun
    Lee, Chin-Feng
    Deng, Yong-Yuan
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 572 - 577
  • [25] Key Management Schemes in Wireless Sensor Networks: A Survey
    Reegan, A. Selva
    Baburaj, E.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 813 - 820
  • [26] QoS mechanisms for MAC protocols in wireless sensor networks: a survey
    Kaur, Tarunpreet
    Kumar, Dilip
    IET COMMUNICATIONS, 2019, 13 (14) : 2045 - 2062
  • [27] A Survey on Public Key Mechanism in Wireless Sensor Networks
    He Y.-X.
    Sun F.-J.
    Li Q.-A.
    He J.
    Wang L.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (03): : 381 - 408
  • [28] Key management schemes in wireless sensor networks: A survey
    1600, IEEE Computer Society : 813 - 820
  • [29] A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
    Gautam, Amit Kumar
    Kumar, Rakesh
    SN APPLIED SCIENCES, 2021, 3 (01):
  • [30] A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks
    Chen, Chin-Ling
    Shih, Tzay-Farn
    Tsai, Yu-Ting
    Li, De-Kui
    JOURNAL OF SENSORS, 2015, 2015