2018
DOI: 10.17706/jcp.13.1.77-89
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Distributed Dynamic Key Management Schemes in Wireless Sensor Networks

Abstract: wireless sensor networks include small-sized sensor nodes with limited resources (energy, memory, etc.). Considering this limitation and their placement in unsupervised locations, e.g. military areas, and since this type of networks does not rely on a fixed infrastructure, security becomes a complex and considerable issue in these networks. Providing data and communication security requires appropriate encryption protocols. Key management is one of the most important mechanism used to secure encryption keys an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Material and methods This section presents the methodology utilized to review key revocation schemes in WSNs. To perform a thorough review and analysis of the literature on key revocation methods, this study adopts a review methodology (Nabavi and Mousavi, 2018). The methodology process flow is presented in figure 2.…”
Section: 0mentioning
confidence: 99%
See 2 more Smart Citations
“…Material and methods This section presents the methodology utilized to review key revocation schemes in WSNs. To perform a thorough review and analysis of the literature on key revocation methods, this study adopts a review methodology (Nabavi and Mousavi, 2018). The methodology process flow is presented in figure 2.…”
Section: 0mentioning
confidence: 99%
“…Many reviews on key management schemes have been conducted in the recent past (Nour et al, 2020). Prominent among them are the authors in (Mall et al, 2013;Nabavi and Mousavi, 2018;Moara-Nkwe et al, 2018). A review of modern distributed dynamic key management schemes in WSNs was proposed in Nabavi and Mousavi, (2018).…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Key management techniques are compared with the consideration of scalability, node authentication, and their deployment knowledge. In this survey, we came to know that all the listed techniques have proper functionality, but the performance degradation is due to the mobility characteristic of nodes and they do not perform well in scalable environments [19][20][21][22][23]. The main reason for the low performance of EDDK is that it calculates the pair-wise keys when the node changes its neighborhood it affects the calculation of keys, pair-wise keys and foreign keys, which would show the wrong instance of pair-wise keys and recalculation of pairwise key is required.…”
Section: Security Analysismentioning
confidence: 99%
“…WSNs are usually comprised of a large number of sensor nodes equipped with limited energy resources, but they should operate for a long time without charge or battery replacement. To increase the network lifetime and reduce energy consumption of the sensor nodes of the network, clustering techniques have been presented to achieve an efficient relationship among the sensor nodes [3,4].…”
Section: Introductionmentioning
confidence: 99%