2007
DOI: 10.1109/mwc.2007.4396946
|View full text |Cite
|
Sign up to set email alerts
|

Key management issues in wireless sensor networks: current proposals and future developments

Abstract: Before a WSN can exchange data securely, encryption keys must be established among sensor nodes. Key distribution refers to the distribution of multiple keys among the sensor nodes, which is typical in a non-trivial security scheme. Key management is a broader term for key distribution, which also includes the processes of key setup, the initial distribution of keys, and key revocation-the removal of a compromised key.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(35 citation statements)
references
References 9 publications
0
33
0
Order By: Relevance
“…[8]. Generally, asymmetric as well as symmetric cryptography could be employed to achieve security [18]. The most robust form of WSN security architecture is based on three different interacting phases [13]: a pair-wise key establishment to provide authentication and the initial key exchange, the establishment of sending clusters to extend pairwise communication to broadcast inside the communication range, and encrypted and authenticated communication of sensor data.…”
Section: Security Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…[8]. Generally, asymmetric as well as symmetric cryptography could be employed to achieve security [18]. The most robust form of WSN security architecture is based on three different interacting phases [13]: a pair-wise key establishment to provide authentication and the initial key exchange, the establishment of sending clusters to extend pairwise communication to broadcast inside the communication range, and encrypted and authenticated communication of sensor data.…”
Section: Security Architecturementioning
confidence: 99%
“…[15]. An attacker may capture and compromise a node and thus be able to control some part or even the whole network [18]. One of the security solutions of WSN is to employ and manage the cryptographic keys.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because of limited storage space and computing power, lacking of a priori knowledge for later nodes deployed, and inability to guarantee the physical security in deployment region for sensor network, the traditional network security method is not suitable for sensor networks. Lightweight key management method, which aims to secure communication, becomes the most important and basic aspect of security research for wireless sensor networks [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…The establishment of the cryptographic keys in the network is called Key Management [2]. This activity affects strongly the security and the computation performance of the network.…”
Section: Introductionmentioning
confidence: 99%