A Survey of Key Negotiation and Authentication Systems in WSNs
Journal Title: EAI Endorsed Transactions on Energy Web - Year 2017, Vol 4, Issue 17
Abstract
Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.
Authors and Affiliations
Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed
A Comparative Study of Various Location Prediction and Interpolation Techniques
Natural catastrophe is a common phenomenon by which the living as well as nonliving entities belong to the environment faces the calamity. But the human beings can presume the disaster and take major steps to prevent it....
Energy-efficient Joint Power Allocation and Channel Selection for D2D Communications
Device-to-device (D2D) communications have gained great attentions due to the potential and numerous benefits for cellular networks. However,it also brings tremendous resource allocation challenges for the sake of the co...
Application of a Hybrid Method for Key Energy Facilities Safety Assessment
Information Technologies (hereinafter – the “IT”) without security functions (hereinafter – the “SF”) are the exception rather than the rule nowadays [1 – 4]. Components of IT without SF are not a big problem since they...
New numerical sizing approach of a standalone photovoltaic power at Ngoundiane, Senegal
A new sizing method based on a numerical approach using the average meteorological data and the load demand of the Ngoundiane site along with both concepts of ALPSP and TLCC is treated in this study. The intuitive method...
Exploration on Increasing Packet delivery rate in WSN using Cluster Approach
Wireless Sensor Network (WSN) plays a vital role and part of real time communication applications. Location of unknown node is difficult to find in the presence of mobile sensor nodes. Navigator plays an important role i...