Affiliation:
1. Czestochowa University of Technology, Poland
Abstract
We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.
Funder
Polish Minister of Science and Higher Education
Regional Initiative of Excellence
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference144 articles.
1. Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. 2005. Password-based authenticated key exchange in the three-party setting. In Proceedings of the International Workshop on Public Key Cryptography. Springer, 65–84.
2. LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT;Far Hossein Abdi Nasib;Wireless Netw.,2021
3. Ahmad Abusukhon and Shadi AlZu’bi. 2020. New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value. In Proceedings of the 7th International Conference on Software Defined Systems (SDS’20). IEEE, 235–239. 10.1109/SDS49854.2020.9143891
4. Home chimney pinwheels (HCP) as steh and remote monitoring for smart building IoT and WSN applications;Akin-Ponnle Ajibike Eunice;Sensors,2023
5. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献