Key Management Techniques in Wireless Sensor Networks

  • Shnaikat K
  • AlQudah A
N/ACitations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

The way that is used to achieve most important security requirements is the cryptography. Cryptography mainly depends on what is called cryptography keys; the cryptographic keys required to be managed by using a robustness technique that guarantees the needed security requirements. So first of all, the necessary keys need to be distributed to the nodes before they are disseminated in the target area, and then let the sensors that need to communicate establish its secure communication by having a deal on what is called pair-wise key, and allow the refreshment process for those keys to be occurred successfully when it is needed, and finally, having the ability to revoke the keys that related to compromised nodes. These phases are performing the process that is called Key Management. In this paper we will explain different key management schemes, critique them theoretically, and propose an idea as a way out for the expected problems in one of these schemes.

Cite

CITATION STYLE

APA

Shnaikat, K. N., & AlQudah, A. A. (2014). Key Management Techniques in Wireless Sensor Networks. International Journal of Network Security & Its Applications, 6(6), 49–63. https://doi.org/10.5121/ijnsa.2014.6605

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free