z-logo
open-access-imgOpen Access
A survey of key distribution in wireless sensor networks
Author(s) -
Chen ChiYuan,
Chao HanChieh
Publication year - 2014
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.354
Subject(s) - key (lock) , computer science , key management , key distribution , wireless sensor network , cryptography , computer security , wireless , distribution (mathematics) , table (database) , key distribution in wireless sensor networks , computer network , wireless network , telecommunications , public key cryptography , data mining , encryption , mathematical analysis , mathematics
Abstract Key establishment is the most fundamental cryptographic primitive in all kinds of applications where security is a concern. However, the nature of limited resources on sensor nodes restricts the use of conventional key management techniques in wireless sensor networks. Many researchers have conducted different techniques to propose different types of key distribution schemes. In this paper, we survey the existing solutions and describe the state‐of‐the‐art techniques. We not only classify these proposals into location‐independent key distribution schemes and location‐dependent key distribution schemes but also provide a comparison table. We hope to attract more research attentions on this direction. Copyright © 2011 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here