Abstract

Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. Physical compromising of sensor nodes by an adversary is an emerging problem in sensor network and accordingly, it is necessary to provide an environment with efficient key management techniques due to resource constraints on sensor network. It is obvious to evaluate the efficiency of symmetric key management schemes for WSN, since it is not feasible to use traditional key management techniques such as asymmetric key cryptosystem and Key Distribution Center (KDC). This survey paper aims to report an extensive study on classification of pairwise key pre-distribution techniques. Further a smaller portion of analysis and security issues using pairwise key management is pronounced. Analysed results shows that polynomial pool based method have higher probability of communication by non-compromised nodes when compared with other schemes. The proposed survey effectively track the merits and demerits of different key predistribution schemes, also the communication overhead and memory overhead is reduced in polynomial pool based method during execution.

Highlights

  • Sensor network in today’s world is used in variant fields such as medical appliances, military forces, wildlife tracking system, environmental monitoring and traffic control application, weather checking and regularity checking of temperature

  • An important challenge is the design of protocols to bootstrap the establishment of a secure communications infrastructure from a collection of sensor nodes which may have been pre-initialized with some secret information but have had no prior direct contact with each other

  • We have taken a survey on various key predistribution schemes for Distributed Wireless Sensor Network (DWSN)

Read more

Summary

Introduction

Sensor network in today’s world is used in variant fields such as medical appliances, military forces, wildlife tracking system, environmental monitoring and traffic control application, weather checking and regularity checking of temperature. WSN offers the major services such as monitoring, alerting and provisioning of information. An important challenge is the design of protocols to bootstrap the establishment of a secure communications infrastructure from a collection of sensor nodes which may have been pre-initialized with some secret information but have had no prior direct contact with each other. We refer to this problem as the bootstrapping problem. A bootstrapping protocol must enable a newly deployed sensor network to initiate a secure infrastructure, but it must allow nodes deployed at a later time to join the network securely.

Methods
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.