A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

被引:0
作者
Amit Kumar Gautam
Rakesh Kumar
机构
[1] University of Technology,Department of CSE, M. M. M
来源
SN Applied Sciences | 2021年 / 3卷
关键词
WSN security; Key distribution; Security attacks; Protocols; Direct trust; Indirect trust;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. Any damage or compromise to data security could have physical and direct effects on network efficiency and safety. One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). Since researchers have provided many protection schemes, it is difficult to select which key management or trust management schemes in a specific WSN application suit best. We did a detailed survey in our paper on how the properties of various trust management, authentication, and key management schemes can be used for specific applications. Based on this review, we present the methodologies, advantages, and limitations of the previously proposed key management, authentication, and trust management scheme in WSN. The goal of this thorough analysis is to compare and find the correct security solution that successfully meets the requirements of the application. Moreover, the strength, weaknesses, and open problems are added that can extend more frontiers to get the best security solutions in the future.s
引用
收藏
相关论文
共 210 条
[1]  
Akyildiz F(2002)Wireless sensor networks: a survey Comput Netw 38 393-422
[2]  
Su W(2012)Research issues in wireless sensor networkapplications: a survey Int J Inform Electron Eng 2 702-126
[3]  
Sankarasubramaniam Y(2018)Wireless sensor network (WSN) in insect monitoring: acoustic technique in insect monitoring a review/survey Int J Eng Technol 7 121-570
[4]  
Cayirci E(2017)Wireless sensor networks: a survey on monitoring water quality J Appl Res Technol 15 562-44
[5]  
Gilbert EP(2019)Wireless sensor networks for greenhouses: an end-to-end review Comput Electron Agric 163 104877-1138
[6]  
Kaliaperumal B(2007)Wireless sensor network security: a survey Secur Distrib Grid Mob Pervasive Comput 1 367-258
[7]  
Rajsingh EB(2010)Security vulnerabilities in wireless sensor networks: a survey J Inform Assur Secur 5 31-1143
[8]  
Saleh Y(2018)A novel physical layer secure key generation and refreshment scheme for wireless sensor networks IEEE Access 6 11374-528
[9]  
Yahya MS(2005)A pairwise key predistribution scheme for wireless sensor networks ACM Trans Inform Syst Secur (TISSEC) 8 228-882
[10]  
Dalyop IA(2009)Key management for static wireless sensor networks with node adding IEEE Trans Ind Inform 10 1133-502