Key Management Protocols for Smart Sensor Networks

Author(s):  
Yassine Maleh ◽  
Abdelkbir Sahid ◽  
Abdellah Ezzati ◽  
Mustapha Belaissaoui

To deliver security services (integrity, confidentiality, authentication, availability), it is necessary that the communicating nodes share cryptographic keys for encryption and authentication. However, it is well known that the encryption systems represent the first line of defense against all types of attacks. Furthermore, cryptographic techniques must be designed to detect the execution of the most dangerous attacks. In addition, these techniques must be small to fit the limited resources of the WSN. The aims of this chapter are to discuss the mechanisms used to secure communications; to show their main adaptations required for adoption in smart sensors, which are described in the literature, particularly in terms of key management and distribution; and finally, to detail the different solutions proposed in the literature to secure the communication of smart and constrained sensor networks in the internet of things based on cryptography and intrusion detection systems.

2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


2014 ◽  
Vol 10 (12) ◽  
pp. 608162 ◽  
Author(s):  
Abdelouahid Derhab ◽  
Abdelghani Bouras ◽  
Mustapha Reda Senouci ◽  
Muhammad Imran

2011 ◽  
Vol 37 (2) ◽  
pp. 147-159 ◽  
Author(s):  
Rodrigo Roman ◽  
Cristina Alcaraz ◽  
Javier Lopez ◽  
Nicolas Sklavos

2013 ◽  
Vol 15 (3) ◽  
pp. 1223-1237 ◽  
Author(s):  
Abror Abduvaliyev ◽  
Al-Sakib Khan Pathan ◽  
Jianying Zhou ◽  
Rodrigo Roman ◽  
Wai-Choong Wong

Sign in / Sign up

Export Citation Format

Share Document