Abstract

AbstractKey establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless sensor networks. Many researchers have conducted different techniques to propose different types of key distribution schemes. In this paper, we survey the existing solutions and describe the state‐of‐the‐art techniques. We not only classify these proposals into location‐independent key distribution schemes and location‐dependent key distribution schemes but also provide a comparison table. We hope to attract more research attentions on this direction. Copyright © 2011 John Wiley & Sons, Ltd.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.