A Survey Of Key Management Schemes In Wireless Sensor Networks
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 9
Abstract
In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is major concern in the wireless sensor network. The traditional network security methods are not suitable for wireless sensor networks because of limited resource. Several Key management and establishment schemes have been proposed to provide light weight ciphers. The key management schemes play an important role in wireless sensor networks to achieve security. In this paper a survey of key management schemes in wireless sensor networks has been executed. Each and every key management schemes has some trade off between limited resource and security. Classification of key management schemes based on encryption was done. Further based on key predistribution (with or without deployment knowledge) and rekeying mechanism, the key management schemes have been analysed and their limitations and advantages have been summarized
Authors and Affiliations
R. Sharmila , P. C. Gopi , Dr. V. Vijayalakshmi
Competitive Advantage through Business Intelligence for E-Commerce
In today’s competitive business world it is certain that there is lot of data to be processed. It is essential for the business organization to analyze and comprehend the generated data for the performance of the organiz...
New Online Modules Model of Software Copy Protection in Serial-Based Method
One of the most significant concerns of software corporations is protect their products against unauthorized copying. Since now the researchers proposed some copy protection models that all of them have weakness to prote...
Packet Mark Methodology for Reduce the Congestion in the Network by using the Code Field in the TCP/IP header
Congestion is one of the major problems of a communication network in routing. The function of a routing is to guide packets through the communication network to their correct destinations. Every router receives the pack...
Effective Searching Shortest Path In Graph Using Prim’s Algorithm
Prims algorithm is studied the shortest path problem in the greedy method which is used to select a subset of the edge such that spanning tree is formed and the weight of the edges is minimal. There are various shortest...
Asymptotic Security Key Generation and Distribution Algorithm
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for bu...