A Survey of Key Negotiation and Authentication Systems in WSNs

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2017, Vol 4, Issue 17

Abstract

Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.

Authors and Affiliations

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed

Keywords

Related Articles

A Comparative Study of Various Location Prediction and Interpolation Techniques

Natural catastrophe is a common phenomenon by which the living as well as nonliving entities belong to the environment faces the calamity. But the human beings can presume the disaster and take major steps to prevent it....

Energy-efficient Joint Power Allocation and Channel Selection for D2D Communications

Device-to-device (D2D) communications have gained great attentions due to the potential and numerous benefits for cellular networks. However,it also brings tremendous resource allocation challenges for the sake of the co...

Application of a Hybrid Method for Key Energy Facilities Safety Assessment

Information Technologies (hereinafter – the “IT”) without security functions (hereinafter – the “SF”) are the exception rather than the rule nowadays [1 – 4]. Components of IT without SF are not a big problem since they...

New numerical sizing approach of a standalone photovoltaic power at Ngoundiane, Senegal

A new sizing method based on a numerical approach using the average meteorological data and the load demand of the Ngoundiane site along with both concepts of ALPSP and TLCC is treated in this study. The intuitive method...

Exploration on Increasing Packet delivery rate in WSN using Cluster Approach

Wireless Sensor Network (WSN) plays a vital role and part of real time communication applications. Location of unknown node is difficult to find in the presence of mobile sensor nodes. Navigator plays an important role i...

Download PDF file
  • EP ID EP45210
  • DOI http://dx.doi.org/10.4108/eai.10-4-2018.154445
  • Views 240
  • Downloads 0

How To Cite

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed (2017). A Survey of Key Negotiation and Authentication Systems in WSNs. EAI Endorsed Transactions on Energy Web, 4(17), -. https://europub.co.uk/articles/-A-45210