scholarly journals Key Distribution and Management in WSN Security: A State of the Art

Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.

2013 ◽  
Vol 10 (2) ◽  
pp. 589-609 ◽  
Author(s):  
Chin-Ling Chen ◽  
Yu-Ting Tsai ◽  
Aniello Castiglione ◽  
Francesco Palmieri

Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of small, inexpensive, battery-powered sensing devices fitted with wireless transmitters, which can be spatially scattered to form an ad hoc hierarchically structured network. Recently, the global positioning system (GPS) facilities were embedded into the sensor node architecture to identify its location within the operating environment. This mechanism may be exploited to extend the WSN?s applications. To face with the security requirements and challenges in hierarchical WSNs, we propose a dynamic location-aware key management scheme based on the bivariate polynomial key predistribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in both the cluster nodes and the sensor nodes. This scheme is robust from the security point of view and able to work efficiently, despite the highly constrained nature of sensor nodes.


Author(s):  
David Urbano ◽  
Andreu Turro ◽  
Mike Wright ◽  
Shaker Zahra

AbstractThis article analyzes the state of the art of the research on corporate entrepreneurship, develops a conceptual framework that connects its antecedents and consequences, and offers an agenda for future research. We review 310 papers published in entrepreneurship and management journals, providing an assessment of the current state of research and, subsequently, we suggest research avenues in three different areas: corporate entrepreneurship antecedents, dimensions and consequences. Even though a significant part of the overall corporate entrepreneurship literature has appeared in the last decade, most literature reviews were published earlier. These reviews typically cover a single dimension of the corporate entrepreneurship phenomenon and, therefore, do not provide a global perspective on the existing literature. In addition, corporate entrepreneurship has been studied from different fields and there are different approaches and definitions to it. This limits our understanding of accumulated knowledge in this area and hampers the development of further research. Our review addresses these shortcomings, providing a roadmap for future research.


2015 ◽  
Vol 1 (2) ◽  
pp. 280
Author(s):  
Sufyan T. Al-Janabi ◽  
Ali J. Dawood ◽  
Ekram Habeeb Hassan

The design and deployment of Wireless Body Area Networks (WBANs) have recently resulted from the use of sensors to measure the biometrics and movements of the human body. The development of such networks is imperative for modern telemedicine and e-health. Since WBANs are dealing with very sensitive information (i.e., medical data which has a direct impact on human life), security is an essential part of WBANs design. Indeed, key management plays pivotal role in ensuring security requirements in WBAN. In this paper, an enhanced version of a biometric-based distributed key management scheme is introduced. This scheme is designed for use in WBAN scenarios. It makes use of key refreshment schedules and distributes key management responsibility among all nodes in a WBAN in a fair manner. The scheme supports the use of biometric measurements to generate symmetric keys in WBANs via facilitating the work of biometric random number generators that can extract a random bit sequence from biological data to generate symmetric keys. A general description of the development of this scheme is given along with all phases of its operation. Furthermore, simulation results are presented with security analysis related to the resistance of the proposed scheme against some possible attacks.


Author(s):  
Tom Coffey

This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.


1995 ◽  
Vol 38 (5) ◽  
pp. 1126-1142 ◽  
Author(s):  
Jeffrey W. Gilger

This paper is an introduction to behavioral genetics for researchers and practioners in language development and disorders. The specific aims are to illustrate some essential concepts and to show how behavioral genetic research can be applied to the language sciences. Past genetic research on language-related traits has tended to focus on simple etiology (i.e., the heritability or familiality of language skills). The current state of the art, however, suggests that great promise lies in addressing more complex questions through behavioral genetic paradigms. In terms of future goals it is suggested that: (a) more behavioral genetic work of all types should be done—including replications and expansions of preliminary studies already in print; (b) work should focus on fine-grained, theory-based phenotypes with research designs that can address complex questions in language development; and (c) work in this area should utilize a variety of samples and methods (e.g., twin and family samples, heritability and segregation analyses, linkage and association tests, etc.).


1976 ◽  
Vol 21 (7) ◽  
pp. 497-498
Author(s):  
STANLEY GRAND

2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

10.37236/24 ◽  
2002 ◽  
Vol 1000 ◽  
Author(s):  
A. Di Bucchianico ◽  
D. Loeb

We survey the mathematical literature on umbral calculus (otherwise known as the calculus of finite differences) from its roots in the 19th century (and earlier) as a set of “magic rules” for lowering and raising indices, through its rebirth in the 1970’s as Rota’s school set it on a firm logical foundation using operator methods, to the current state of the art with numerous generalizations and applications. The survey itself is complemented by a fairly complete bibliography (over 500 references) which we expect to update regularly.


2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Sign in / Sign up

Export Citation Format

Share Document