{"title":"A Taxonomy of Key Management Schemes of Wireless Sensor Networks","authors":"P. Vamsi, K. Kant","doi":"10.1109/ACCT.2015.109","DOIUrl":null,"url":null,"abstract":"Research on secure key management in Wireless Sensor Networks (WSNs) using cryptography has gained significant attention in the research community. However, ensuring security with public key cryptography is a challenging task due to resource limitation of sensor nodes in WSNs. In recent years, numerous researchers have proposed efficient lightweight key management schemes to establish secure communication. In this paper, the authors provide a study on several key management schemes developed for WSNs and their taxonomy with respect to various network and security metrics.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"433 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2015.109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Research on secure key management in Wireless Sensor Networks (WSNs) using cryptography has gained significant attention in the research community. However, ensuring security with public key cryptography is a challenging task due to resource limitation of sensor nodes in WSNs. In recent years, numerous researchers have proposed efficient lightweight key management schemes to establish secure communication. In this paper, the authors provide a study on several key management schemes developed for WSNs and their taxonomy with respect to various network and security metrics.