Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

Author:

Szymoniak Sabina1

Affiliation:

1. Czestochowa University of Technology, Poland

Abstract

We use sensor technologies in many areas of everyday life. We use sensors to check and study various phenomena and to improve our lives. Hence, the sensors are used in medicine, industry, sports, and many other aspects of everyday life. Interconnected sensors and other wireless devices and servers form Wireless Sensor Networks. During communication between the nodes of such networks, we often send private and sensitive data. These data should be properly secured. Securing communication in a Wireless Sensor Network mainly affects the reconciliation and distribution of session keys and authentication. Specially designed protocols must protect both methods. In turn, the protocols may be exposed to dishonest users of such networks and thus exposed to various attacks (for example, replay attacks and smart card stolen attacks). This article surveys the existing session key negotiation, distribution, and authentication protocols. We will explain the security problems and threats to which the sensor networks are exposed. We will discuss the security levels implemented by the protocols currently used in sensor networks. We will analyze the challenges and requirements faced by the newly designed protocols.

Funder

Polish Minister of Science and Higher Education

Regional Initiative of Excellence

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference144 articles.

1. Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. 2005. Password-based authenticated key exchange in the three-party setting. In Proceedings of the International Workshop on Public Key Cryptography. Springer, 65–84.

2. LAPTAS: Lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT;Far Hossein Abdi Nasib;Wireless Netw.,2021

3. Ahmad Abusukhon and Shadi AlZu’bi. 2020. New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value. In Proceedings of the 7th International Conference on Software Defined Systems (SDS’20). IEEE, 235–239. 10.1109/SDS49854.2020.9143891

4. Home chimney pinwheels (HCP) as steh and remote monitoring for smart building IoT and WSN applications;Akin-Ponnle Ajibike Eunice;Sensors,2023

5. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3