Abstract

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.

Highlights

  • Wireless sensor networks are a simple and economic approach in deploying monitoring and control devices

  • They perform the following tasks: they sense the physical quantity from the surroundings where they are deployed, they process the acquired data, and they transfer the data through wireless communication to data collection points which are called base stations, destinations or sink nodes

  • The Energy Balanced Clustering algorithm based on LEACH for Wireless Sensor Networks (WSNs) is an improved version of the LEACH protocol to enhance the energy of the network

Read more

Summary

INTRODUCTION

Wireless sensor networks are a simple and economic approach in deploying monitoring and control devices. WSNs are typically self-healing and selforganizing in nature They organize themselves to maintain communication between the nodes of the network. A WSN consists of a number of nodes which are battery driven devices They perform the following tasks: they sense the physical quantity from the surroundings where they are deployed, they process the acquired data, and they transfer the data through wireless communication to data collection points which are called base stations, destinations or sink nodes. To achieve the security requirements, an efficient scheme for group key management is needed. Apsara et al.: A Review on Secure Group Key Management Schemes for Data Gathering in Wireless

LITERATURE SURVEY
Compression and Aggregation
Key Management and Data Gathering
Encryption and Authentication
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call