The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expected problems in one of these schemes.
CITATION STYLE
Shnaikat, K. N., & AlQudah, A. A. (2014). Key Management Techniques in Wireless Sensor Networks. International Journal of Network Security & Its Applications, 6(6), 49–63. https://doi.org/10.5121/ijnsa.2014.6605
Mendeley helps you to discover research relevant for your work.