A Survey Of Key Management Schemes In Wireless Sensor Networks

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends and Technology (IJCOT)          
 
© 2013 by IJCOT Journal
Volume-3 Issue-5                           
Year of Publication : 2013
Authors :  R.Sharmila , P.C.Gopi , Dr.V.Vijayalakshmi

Citation

R.Sharmila , P.C.Gopi , Dr.V.Vijayalakshmi . "A Survey Of Key Management Schemes In Wireless Sensor Networks " . International Journal of Computer & organization Trends (IJCO T), V3(5):48-52 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is major concern in the wireless sensor network. The traditional network security methods are not suitable for wireless sensor networks because of limited resource. Several Key management and establishment schemes have been proposed to provide light weight ciphers. The key management schemes play an important role in wireless sensor networks to achieve security. In this paper a survey of key management schemes in wireless sensor networks has been executed. Each and every key management schemes has some trade off between limited resource and security. Classification of key management schemes based on encryption was done. Further based on key predistribution (with or without deployment knowledge) and rekeying mechanism, the key management schemes have been analysed and their limitations and advantages have been summarized.

References

 [1] D. Malan, M. Welsh, and M.D. Smith, ”A Public- Key Infrastructure for Key Distribution in TinyOs Based on Elliptic Curve Cryptography,” in Proc. of 1st IEEE International Conference Communications and Networks(SECON), Santa Clara, CA, Oct. 2004.
[2] Lai B, Kim S, Verb auwhede I, “Scalable session key construction protocol for wireless sensor networks”, In: Proceedings of the IEEE workshop on Large Scale Real Time and Embedded Systems LARTES ,December 2002.
[3] S.Zhu, S. Setia, and S.Jajodia,”LEAP: Efficient Security Mechanism for Large Scale Sensor Networks,” Proc. of the 10th ACM Conference on Computer and Communication Security (CCS’03), Washington D.C., and October, 2003.
[4] A.Perrig, et. al, “SPINS: Security Protocols for Sensor Networks”, Proc. of ACM MOBICOM, 2001.
[5] Chan H, Perrig A, “PIKE: peer intermediaries for key establishment in sensor networks”, In: Proceedings of the 24 th annual joint conference of the IEEE computer and communications societies (INFOCOM’05), Miami, FL, USA, March 2005.p.524–35.
[6] Chan H, Perrig A, “Random key predistribution schemes for sensor networks”. In: Proceedings of the 2003 IEEE symposium on security and privacy, May 2003.p.197–213.
[7] Eschenauer L, Gligor B D, “A key-management scheme for distributed sensor networks”, In: Proceedings of the 9th ACM conference on computer and communication security, Washington, DC, USA, 2002.p.41–7.
[8] Blom R,"Theory and application of cryptographic techniques”, In Proceeding of the Eurocrypt 84 workshop on advances in cryptology, Berlin: Springer; 1985. p. 335–8.
[9] Du W, Han Y S, Chen S, Varshney P K, “A key management scheme for wireless sensor networks using deployment knowledge” , In: Proceedings of IEEE INFOCOM 04. Hong Kong: IEEE Press; 2004.p.586–97.
[10] Hang Yan Dai, “Key Predistribution approach in Wireless Sensor Network using LU Matrix,”IEEE sensor journal, Vol.10, no.8, August 2010.
[11] Amar Rasheed, “Key predistribution Scheme for Establishing Pairwise keys with a mobile sink in sensor network,” Vol.22, no.1, Jan. 2011.
[12] D. Malan, M. Welsh, and M.D. Smith, “A Public- Key Infrastructure for Key Distribution in TinyOs Based on Elliptic Curve Cryptography,” in Proc. of 1st IEEE International Conference Communications and Networks(SECON), Santa Clara, CA, Oct. 2004.
[13] A.S. Wander, N. Gura, H. Eberle et al., “Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks,” in Proc. of the 3rd International Conference on Pervasive Computing and Communications(PERCOM),2005.
[14] X. Du, Y. Xiao, M. Guizani, and H.H. Chen, “A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensors Networks.” IEEE Transactions on Wireless Communications, accepted and to appear.

Keywords

Wireless sensor Networks, Key Management Schemes, Symmetric Key Management Schemes, Asymmetric Key Management Schemes, Dynamic Key Management Schemes.