A Survey of Key Predistribution Schemes for Key Management in Wireless Sensor Networks

被引:0
|
作者
Manoj, R. [1 ]
Dhinakaran, N. [1 ]
机构
[1] Karunya Univ, Dept Informat Technol, Coimbatore, Tamil Nadu, India
关键词
Key predistribution; key management; pairwise key; polynomial pool base; q-composite;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Sensor Node in Wireless Sensor Network has very limited resources such as processing capability, memory capacity, battery power, and communication capability. When the communication between any two sensor nodes are required to be secured, the symmetric key cryptography technique is used for its advantage over public key cryptography in terms of requirement of less resources. Keys are pre-distributed to each sensor node from a set of keys called key pool before deployment of sensors nodes. In this paper, we provide a survey of key management schemes in wireless sensor networks. We notice that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.
引用
收藏
页码:135 / +
页数:2
相关论文
共 50 条
  • [41] A collusion attack on pairwise key predistribution schemes for distributed sensor networks
    Moore, T
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 251 - +
  • [42] Key predistribution schemes for distributed sensor networks via block designs
    Bose, Mausumi
    Dey, Aloke
    Mukerjee, Rahul
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (01) : 111 - 136
  • [43] Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
    Hazra, Prasun
    Giri, Debasis
    Das, Ashok Kumar
    MATHEMATICS AND COMPUTING, 2015, 139 : 135 - 154
  • [44] Key predistribution schemes for sensor networks using finite plane geometry
    Mohri, Hisashi
    Matsumoto, Ritsuko
    Kaji, Yuichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05): : 1416 - 1423
  • [45] A game based model of security for key predistribution schemes in wireless sensor network
    Mukhopadhyay, D
    Roy, S
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 334 - 347
  • [46] Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks
    Liu, Yongsheng
    Li, Jie
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 559 - 564
  • [47] Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
    Dai, Hangyang
    Xu, Hongbing
    IEEE SENSORS JOURNAL, 2010, 10 (08) : 1399 - 1409
  • [48] An ID-Based Key Predistribution Scheme for Wireless Sensor Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 185 - +
  • [49] Random key predistribution for wireless sensor networks using deployment knowledge
    Jaworski, J.
    Ren, M.
    Rybarczyk, K.
    COMPUTING, 2009, 85 (1-2) : 57 - 76
  • [50] A canonical seed assignment model for key predistribution in wireless sensor networks
    Tague, Patrick
    Poovendran, Radha
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (04)