Overview on Key Distribution Primitives in Wireless Sensor Network

Owing to the security requirements of wireless sensor network, the background of Wireless Sensor Network (WSN) is to be analyzed with different threats and attack models. Physical compromising of sensor nodes by an adversary is an emerging problem in sensor network and accordingly, it is necessary to provide an environment with efficient key management techniques due to resource constraints on sensor network. It is obvious to evaluate the efficiency of symmetric key management schemes for WSN, since it is not feasible to use traditional key management techniques such as asymmetric key cryptosystem and Key Distribution Center (KDC). This survey paper aims to report an extensive study on classification of pairwise key pre-distribution techniques. Further a smaller portion of analysis and security issues using pairwise key management is pronounced. Analysed results shows that polynomial pool based method have higher probability of communication by non-compromised nodes when compared with other schemes. The proposed survey effectively track the merits and demerits of different key predistribution schemes, also the communication overhead and memory overhead is reduced in polynomial pool based method during execution.

[1]  D. Velmurugan,et al.  Energy Aware Optimal Routing for Wireless Sensor Networks , 2007 .

[2]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[3]  Rabi N. Mahapatra,et al.  Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Ashutosh Sabharwal,et al.  Communication power optimization in a sensor network with a path-constrained mobile observer , 2006, TOSN.

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.