Abstract
AbstractWireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. Any damage or compromise to data security could have physical and direct effects on network efficiency and safety. One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). Since researchers have provided many protection schemes, it is difficult to select which key management or trust management schemes in a specific WSN application suit best. We did a detailed survey in our paper on how the properties of various trust management, authentication, and key management schemes can be used for specific applications. Based on this review, we present the methodologies, advantages, and limitations of the previously proposed key management, authentication, and trust management scheme in WSN. The goal of this thorough analysis is to compare and find the correct security solution that successfully meets the requirements of the application. Moreover, the strength, weaknesses, and open problems are added that can extend more frontiers to get the best security solutions in the future.s
Funder
University Grants Commission
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Physics and Astronomy,General Engineering,General Environmental Science,General Materials Science,General Chemical Engineering
Reference98 articles.
1. Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
2. R. Grace Sensor-enabled nodes support the IoT for smart buildings and smart transport. IoT Technologies and Applications Symposium, May 21, San Jose
3. M. Rouvala White paper: security and WSN. New Nordic Engineering. Nov 2017
4. Gilbert EP, Kaliaperumal B, Rajsingh EB (2012) Research issues in wireless sensor networkapplications: a survey. Int J Inform Electron Eng 2(5):702
5. P.C Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems In proceeding of Annual International Cryptology Conference, pp. 104-113. 1996 Aug 18Springer, Berlin, Heidelberg
Cited by
62 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献