A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Author:

Gautam Amit KumarORCID,Kumar Rakesh

Abstract

AbstractWireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. Any damage or compromise to data security could have physical and direct effects on network efficiency and safety. One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). Since researchers have provided many protection schemes, it is difficult to select which key management or trust management schemes in a specific WSN application suit best. We did a detailed survey in our paper on how the properties of various trust management, authentication, and key management schemes can be used for specific applications. Based on this review, we present the methodologies, advantages, and limitations of the previously proposed key management, authentication, and trust management scheme in WSN. The goal of this thorough analysis is to compare and find the correct security solution that successfully meets the requirements of the application. Moreover, the strength, weaknesses, and open problems are added that can extend more frontiers to get the best security solutions in the future.s

Funder

University Grants Commission

Publisher

Springer Science and Business Media LLC

Subject

General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering

Reference98 articles.

1. Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

2. R. Grace Sensor-enabled nodes support the IoT for smart buildings and smart transport. IoT Technologies and Applications Symposium, May 21, San Jose

3. M. Rouvala White paper: security and WSN. New Nordic Engineering. Nov 2017

4. Gilbert EP, Kaliaperumal B, Rajsingh EB (2012) Research issues in wireless sensor networkapplications: a survey. Int J Inform Electron Eng 2(5):702

5. P.C Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems In proceeding of Annual International Cryptology Conference, pp. 104-113. 1996 Aug 18Springer, Berlin, Heidelberg

Cited by 62 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Performance and Accuracy Enhancement of Cloud Environment During Precision Agriculture;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2024-07-03

2. Quantum key distribution (QKD) for wireless networks with software‐defined networking;Internet Technology Letters;2024-05-28

3. Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks;The Journal of Supercomputing;2024-05-24

4. Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation;International Journal of Information Technology;2024-05-12

5. Parted Security Method for Secure Data Exchange in Heterogeneous Applications Using Wireless Sensor Networks;2024 Third International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE);2024-04-26

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3