z-logo
open-access-imgOpen Access
A Systemic view of One-Pass Cryptographic Key Distribution Techniques for WSNs
Author(s) -
Manoj Ranjan Mishra,
Amit Kore,
Jayaprakash Kar
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.a5018.119119
Subject(s) - wireless sensor network , computer science , key management , software deployment , key (lock) , cryptography , computer network , focus (optics) , computer security , field (mathematics) , key distribution , cryptographic primitive , distributed computing , cryptographic protocol , public key cryptography , encryption , physics , mathematics , pure mathematics , optics , operating system
The availability and use of cheaper and smaller sensors has brought an evolution in the field of Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to monitor and congregate data about the living organisms therein. In near future, millions more devices are expected to be connected. We focus upon the security services required by WSNs that are most challenging as compared to other networks. First, we introduce the commercially used motes with the comparison of technical and implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key distribution mechanism.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here