Loading

Key Distribution and Management in WSN Security: A State of the Art
Priyanka Ahlawat

Priyanka Ahlawat, Department of Computer Engineering, National Institute of Technology, Kurukshetra (Haryana), India. 

Manuscript received on 05 December 2019 | Revised Manuscript received on 13 December 2019 | Manuscript Published on 31 December 2019 | PP: 462-472 | Volume-9 Issue-2S December 2019 | Retrieval Number: B11181292S19/2019©BEIESP | DOI: 10.35940/ijitee.B1118.1292S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.

Keywords: Key Management, Wireless Sensor Networks, Key Distribution, Key Revocation, Rekeying.
Scope of the Article: WSN