Abstract
Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.
Publisher
Engineering, Technology & Applied Science Research
Reference20 articles.
1. W. Jerbi, A. Guermazi, H. Trabelsi, “A novel clustering algorithm for coverage a large scale in Wireless Sensor Networks”, International Journal on Computational Science & Applications, Vol. 6, No. 2, pp. 1-16, 2016
2. D. Charaan, R. Ramesh, E. Uma, “Energy balanced clustering algorithm on LEACH Protocol for WSN”, International Journal of Innovation and Scientific Research, Vol. 23, No. 2, pp. 293-302, 2016
3. S. P. Singh, S. C. Sharma, “A novel energy efficient clustering algorithm for Wireless Sensor Networks”, Engineering, Technology & Applied Science Research, Vol. 7, No. 4, pp. 1775-1780, 2017
4. C. Cao, X. Zhu, “Energy management using Optimal Fuzzy Logic Control in Wireless Sensor Network”, International Journal of Online and Biomedical Engineering, Vol. 14, No. 9, pp. 35-52, 2018
5. H. N. Dheemanth, “LZW Data Compression”, American Journal of Engineering Research, Vol. 3, No. 2, pp. 22-26, 2014
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献