“…According to our thorough investigation in the area, there is currently no comprehensive survey on the key revocation mechanisms in wireless sensor network. A good number of surveys on sensors and wireless sensor networks are available today focusing on the various aspects of security (Djenouri et al, 2005;Wang et al, 2006;Walters et al, 2007;Zhou et al, 2008;Li and Gong, 2008;Chen et al, 2009;Sen, 2009;Zhang et al, 2010;Abduvaliyev et al, 2013), data aggregation techniques (Rajagopalan and Varshney, 2006;Wang and Liu, 2011), power control issues (Pantazis and Vergados, 2007), multimedia streaming in WSN (Misra et al, 2008;Seema and Reisslein, 2011;Ehsan and Hamdaoui, 2012), Medium Access Control (MAC) related issues (Bachir et al, 2012;Suriyachai et al, 2012;Dong and Dargie, 2013;Doudou et al, 2013;Huang et al, 2013), challenges and approaches of providing Operating System (OS) support for WSN (Dong et al, 2010), Computational Intelligence in WSN (Kulkarni et al, 2011), energy harvesting in WSN (Sudevalayam and Kulkarni, 2011), energy-efficiency issues (Ehsan and Hamdaoui, 2012;Aziz et al, 2013;Pantazis et al, 2013), wireless communications, interference, and connectivity issues (Young and Boutaba, 2011;Kashi and Sharifi, 2013), reference structure in sensor systems (Peng and Xiao, 2012), mobility issues (Dong and Dargie, 2013), Quality of Service (QoS) issues (Ehsan and Hamdaoui, 2012), routing issues (Li et al, 2011;Ehsan and ...…”