A wireless sensor network technology is immensely utilizing in multiple fields, for example; physical environment monitoring, surveillance systems, object tracking systems, robotic systems and many more. Usually, wireless sensor nodes are deployed in remote or hostile environments, and such sensors are vulnerable to compromise different attacks; therefore, a suitable and efficient key management scheme is essential at this point. Recently, different key management approaches are proposed by different researchers to address security challenges, especially for WSNs. Since key management is a core scheme to ensure security for network resources along with solving the problem of key generation, distribution, and secret key management. Hence, in this investigational study have to provide a detailed study on reliable key management techniques which are playing a vital role in large-scale WSNs. This study classifying the key management scheme into Asymmetric based and Symmetric based key management schemes and highlighting their functionalities by evaluating performance parameters. In the beginning, the study defines a workflow of the key management system followed by life cycle. Additionally, have briefly discussing popular key-management algorithmic approaches their applications and limitations.
2The remaining part of the study is structured as; section-II discusses workflow of key management scheme with architecture followed by key management lifecycle. Section-III illustrates about recent research towards different key management schemes. Additionally, different security key management algorithmic approaches are discussing in section-IV. The section-V highlights the open research challenges found from the prior studies as well as conclusion of the study.
ABOUT KEY MANAGEMENT SCHEMEA proper key management scheme deals with the key generation, sharing, storage, usage and replacement of cryptographic key in a security system. In every cryptographic system, a proper key management scheme contains effective cryptography for security. Therefore, in this section have to discuss the detail flow process of key management scheme with architecture is shown in the figure-1. Also knows about how data encryption will perform over the network.