Review of Various Existing Key Management Schems in Wirless Sensor Networks

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-23 Number-3
Year of Publication : 2015
Authors : Arshdeep Kaur, Supreet kaur


Arshdeep Kaur, Supreet kaur "Review of Various Existing Key Management Schems in Wirless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V23(3):99-102, May 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
WSNs are widely used in various medical, military, weather or several other applications. The trend of WSNs is rising every year and they are being exposed to various new fields. With the rise of the popularity of WSN into several fields, the probability of their being attacked is also rising equally. The WSNs has been to protected in several cases in order to protect the sensitive information from being leaked or exposed to the hackers or other antisocial elements. There are several existing security mechanisms for the WSNs security, which are offer the data encryption, authentication or other similar or non-similar methods to protect the WSNs against attacks. The existing authentication schemes are based upon the predictive key exchange mechanism, which can fall prey to several types of hacking methods, like key guessing attacks, algorithm replication, relay or replay attacks. In this paper, we present the review of various existing key management schemes.

[1] Walid Abdallah, Noureddine Boudriga, Daehee Kim, and Sunshin An. "An efficient and scalable key management mechanism for wireless sensor networks." In Advanced Communication Technology (ICACT), 2014 16th International Conference on, pp. 687-692. IEEE, 2014.
[2] Ravi Kishore Kodali. "Key management technique for WSNs." In Region 10 Symposium, 2014 IEEE, pp. 540-545. IEEE, 2014.
[3] Prabhakar Varadarajan, and Garth Crosby. "Implementing IPsec in Wireless Sensor Networks." In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pp. 1-5. IEEE, 2014.
[4] Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig and Virgil Gligor, “KISS: Key it Simple and Secure Corporate Key Management”, Trust and Trustworthy Computing Lecture Notes in Computer Science, volume 7904, pp. 1-18, Springer, 2013.
[5] N. Suganthi, V. Sumathy, “Energy Efficient Key Management Scheme for Wireless Sensor Networks”, vol 9, issue 1, pp. 71-78, Int. J. Computcommun, 2014.
[6] Lin He, Yi-Ying Zhang, Lei Shu, A. V Vasilakos Myong- Soon Park, "Energy-efficient Location-dependent key management Scheme for Wireless Sensor Networks," Proc. 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), Dec 2010.

WSN security, key exchange, authentication, encryption.