An Overview of Key Management in Wireless Sensors Network
Journal Title: Journal of Computing and Management Studies (JCMS) - Year 2017, Vol 1, Issue 2
Abstract
These days wireless communication is gaining popularity. With the recent advancement in wireless industry, we became aware of a new technology know as wireless sensor network. Wireless sensor network is one of the new additions in the family of wireless network. The combination of Micro-electro-mechanical system (MEMS) and wireless communication technology makes wireless sensor networks as practical vision to deploy a large-scale, low power, inexpensive sensor networks. Wireless sensor networks guarantees advantages over the traditional sensing methods in many ways: large-scale, densely deployment not only extends the spatial coverage and achieves higher resolution, but also increases the fault-tolerance and robustness of the system, their ad hoc nature and deploy vision make it even more attractive in military applications and other risk-associated applications. Such as habitat monitoring and environmental observations. Due to the potential advantages associated with wireless sensor networks, the research in this area growing continuously. At present, research prototypes and sensor nodes are designed and manufactured. Energy efficient topology control protocols and routing schemes have been implemented and evaluated; various enabling technologies, such as time synchronization, localization and tracking, key management are being studied and invented. The contribution of this work is to investigate the key management of the wireless sensor networks. We believe that the findings as presented in this work will be beneficial specially in designing and developing secure solution in wireless sensor networks.
Authors and Affiliations
Akhlaq Ahmed
Communication Architecture in Wireless Sensors Network
Wireless sensor network is the distributed network of these tiny sensors also called the nodes, consists of sensing, data processing and communicating components leverage the idea of sensor network, these nodes are dedic...
Cloud Computing – Threats and Challenges
Recent advances in cloud technologies have gained much eminence in successfully delivering computing services, but yet to receive much needed attention to offer comprehensive evaluation of the existing security and priva...
Islamic Financing Contracts
Islamic finance has been expanding strongly all over the world during the past few years and shows significant product innovation and sophistication. Shariah-compliant products have proven to be attractive and offer many...
Appraisal of an Expanding Global Internet-Related Crime. The Case of Cyber Crime in Nigeria
This paper has endeavored to loot at the concept of cybercrime in terms of what it is and what it is not. As individual countries are making efforts to curb the menace of cybercrime, there are also global efforts aimed a...
The Teacher's Guide of Running a Lesson
Language is not only a transparent tool, but the teachers need know how to teach it and include it in lesson planning .That is why understanding learning and teaching process is a critical subject in education. There are...