A Survey of Key Negotiation and Authentication Systems in WSNs

Journal Title: EAI Endorsed Transactions on Energy Web - Year 2017, Vol 4, Issue 17

Abstract

Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.

Authors and Affiliations

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed

Keywords

Related Articles

Algorithms of Energy Efficient Control of Electric Technological Complex for Autonomous Heat Supply

The algorithms for energy efficient control of an electric technological complex with a frequency-controlled electric drive for autonomous heat and hot water supply based on hydrodynamic heaters have been developed. The...

A comparative study based on the Genetic Algorithm (GA) method for the optimal sizing of the standalone photovoltaic system in the Ngoundiane site

We study a sizing method using Artificial Intelligence Techniques (AI) to find the optimal sizes of a standalone photovoltaic system in Ngoundiane, Senegal. The sizing of the PV system is considered here as a mono-object...

Design and Simulation of a Low-Actuation-Voltage MEMS Switch

This paper presents a low-actuation-voltage micro-electro-mechanical system (MEMS) capacitive shunt switch which has a very large bandwidth (4 GHz to 24 GHz). In this work, the isolation of MEMS switch is improved by add...

Multi-Class Queuing Networks Models for Energy Optimization

The increase of energy consumption and the related costs in large data centers has stimulated new researches on techniques to optimize the power consumption of the servers. In this paper we focus on systems that should p...

Demand Response an Alternative Solution to Prevent Load Shedding Triggering

This paper investigates an alternative solution to prevent Load Shedding (LS) triggering during underfrequency and proposes a new technique to restore the frequency during emergency events. Demand response (DR) is consid...

Download PDF file
  • EP ID EP45210
  • DOI http://dx.doi.org/10.4108/eai.10-4-2018.154445
  • Views 254
  • Downloads 0

How To Cite

Mohammad Tehseen, Huma Javed, Ishtiaq Hussain Shah, Sheeraz Ahmed (2017). A Survey of Key Negotiation and Authentication Systems in WSNs. EAI Endorsed Transactions on Energy Web, 4(17), -. https://europub.co.uk/articles/-A-45210