A Survey of Key Negotiation and Authentication Systems in WSNs

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2017, Vol 4, Issue 17

Abstract

Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.

Authors and Affiliations

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed

Keywords

Related Articles

Improving ZooKeeper Atomic Broadcast Performance When a Server Quorum Never Crashes

Operating at the core of the highly-available ZooKeeper system is the ZooKeeper atomic broadcast (Zab) for imposing a total order on service requests that seek to modify the replicated system state. Zab is designed with...

Justifying and choosing parameters of the wind power installation with an automatically controlled sailing working body

The article considers a wind power installation, which significantly differs from the other existing wind power installations in that it has rocking an automatically controlled sail of a toroidal shape and a manipulator...

Energy-efficient Joint Power Allocation and Channel Selection for D2D Communications

Device-to-device (D2D) communications have gained great attentions due to the potential and numerous benefits for cellular networks. However,it also brings tremendous resource allocation challenges for the sake of the co...

Algorithms for building distribution networks of electricity supply, reducing losses of electricity

The basis for achieving high quality of electricity are three components: high-quality power generation, uninterrupted transmission and distribution over reliable networks. In conditions of commensurability of the power...

A Middleware for Power Management in Multicore Smartphones

Increased power consumption is a critical concern for smartphone users. While multi-core processors in smartphones have already emerged in market, current applications are yet to take full advantage of this new architect...

Download PDF file
  • EP ID EP45210
  • DOI http://dx.doi.org/10.4108/eai.10-4-2018.154445
  • Views 226
  • Downloads 0

How To Cite

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed (2017). A Survey of Key Negotiation and Authentication Systems in WSNs. EAI Endorsed Transactions on Energy Web, 4(17), -. https://europub.co.uk/articles/-A-45210