A Comprehensive Survey on Various key Management Schemes in WSN

A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor network environment for carrying out multiple tasks. Data packets transmitted in wireless sensor network needs to be protected. Security keys can be generated and used to transmit data securely. These security key generation task needs to be properly managed in WSN. Efficient key management assists in providing confidentiality, integrity to the transmitted information. The security keys, if properly managed, blocks unauthorized users from accessing the transmitted data. Numerous key management mechanisms have been proposed in research literature. This proposed work presents a detailed survey performed on the current set of widely practiced key management techniques in WSNs. Both asymmetric encryption and hybrid type of encryption techniques are applied in key management. The survey presented analyzes the various key management techniques pertaining to computational overhead, communication complexity, energy consumption, robustness and scalability. The survey will be helpful for researchers in selecting the appropriate key management technique specific to their application needs.

[1]  Yong Guan,et al.  A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.

[2]  Haijun LiangChao Wang An Energy Efficient Dynamic Key Management Scheme Based on Polynomial and Cluster in Wireless Sensor Netwoks , 2011 .

[3]  Ibtisam Joda Habeeb,et al.  Secured Wireless Sensor Network Using Improved Key Management , 2016, ICNCC '16.

[4]  Jidong Wang,et al.  An efficient key management scheme in hierarchical wireless sensor networks , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).

[6]  Mayank Dave,et al.  An attack model based highly secure key management scheme for wireless sensor networks , 2018 .

[7]  Makhlouf Aliouat,et al.  Tree Based Protocol for Key Management in Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[8]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[9]  Igor M. Moraes,et al.  SENSORLock: a lightweight key management scheme for wireless sensor networks , 2013, Secur. Commun. Networks.

[10]  Jie Huang,et al.  An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter , 2014, Sensors.

[11]  Ankit Gupta,et al.  Improved blom key management scheme for wireless sensor network , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).

[12]  Xing Zhang,et al.  EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[13]  Huagang Xiong,et al.  An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[14]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[15]  N. Suganthi,et al.  Energy Efficient Key Management Scheme for Wireless Sensor Networks , 2014, Int. J. Comput. Commun. Control.

[16]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[17]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[18]  Alwyn Roshan Pais,et al.  A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network , 2015, ICDCIT.