Abstract
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. Any damage or compromise to data security could have physical and direct effects on network efficiency and safety. One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). Since researchers have provided many protection schemes, it is difficult to select which key management or trust management schemes in a specific WSN application suit best. We did a detailed survey in our paper on how the properties of various trust management, authentication, and key management schemes can be used for specific applications. Based on this review, we present the methodologies, advantages, and limitations of the previously proposed key management, authentication, and trust management scheme in WSN. The goal of this thorough analysis is to compare and find the correct security solution that successfully meets the requirements of the application. Moreover, the strength, weaknesses, and open problems are added that can extend more frontiers to get the best security solutions in the future.s
Highlights
Wireless sensor networks (WSN) are worldwide emerging at accelerating speed
This paper has concisely presented wireless sensor networks and the issues related to organizing and positioning them in unknown environments
There are many key management schemes categorized as probabilities, ID based, master key, location, and polynomial equation based keys distribution scheme
Summary
Wireless sensor networks (WSN) are worldwide emerging at accelerating speed. In today’s scenario, security and trustworthiness are observed as a necessity in WSN and IoT [1]. In today’s scenario, the world uses these data collected by sensors from inaccessible environments. These data do not necessarily contain errors and does not alter during transmission. The Internet Integrated Sensor Network (IISN) should be able to provide defense, integrity, privacy, and security against various threats and attacks. As for connectivity between the Internet, sensors and smart devices increases, companies providing security services have a good opportunity. WSN is featured by dynamic network topology due to the fixed or mobile nature of the nodes.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.