Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

被引:7
作者
Szymoniak, Sabina [1 ]
机构
[1] Czestochowa Tech Univ, Dabrowskiego 69, PL-42201 Czestochowa, Poland
关键词
Wireless sensors network; authentication protocols; key distribution protocols; security; INTERNET; SCHEME; PROTECTION; SECURE; MODEL;
D O I
10.1145/3638043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] A biometrics-based anonymous authentication and key agreement scheme for wireless sensor networks
    Fan, Qing
    Chen, Jianhua
    Xu, Feng
    Li, Li
    Luo, Min
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16)
  • [32] Comprehensive survey of routing protocols for Mobile Wireless Sensor Networks
    Rady, Asmaa
    El-Rabaie, E. L-Sayed M.
    Shokair, Mona
    Abdel-Salam, Nariman
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (15)
  • [33] A survey of key management schemes in wireless sensor networks
    Xiao, Yang
    Rayi, Venkata Krishna
    Sun, Bo
    Du, Xiaojiang
    Hu, Fei
    Galloway, Michael
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2314 - 2341
  • [34] Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks
    Thevar, Gnana Kousalya Chella
    Rohini, G.
    WIRELESS NETWORKS, 2017, 23 (05) : 1479 - 1489
  • [35] A Secure Authentication Mechanism for Wireless Sensor Networks
    Ali, Rifaqat
    Chandrakar, Preeti
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    Pal, Arup Kumar
    Islam, S. K. Hafizul
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 206 - 213
  • [36] Initial Key Distribution for Industrial Wireless Sensor Networks
    Ray, Apala
    Akerberg, Johan
    Gidlund, Mikael
    Bjoerkman, Mats
    2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2013, : 1309 - 1314
  • [37] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [38] Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks
    Han, Kyusuk
    Kim, Kwangjo
    Choi, Wook
    Choi, Hyo Hyun
    Seo, Jungtaek
    Shon, Taeshik
    AD HOC & SENSOR WIRELESS NETWORKS, 2012, 14 (3-4) : 251 - 269
  • [39] Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
    Hazra, Prasun
    Giri, Debasis
    Das, Ashok Kumar
    MATHEMATICS AND COMPUTING, 2015, 139 : 135 - 154
  • [40] Physiological-signal-based key negotiation protocols for body sensor networks: A survey
    Zhao, Huawei
    Xu, Ruzhi
    Shu, Minglei
    Hu, Jiankun
    SIMULATION MODELLING PRACTICE AND THEORY, 2016, 65 : 32 - 44