Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Key Management

Handbook of Research on Wireless Security
The process of managing key materials (e.g., key generation, key distribution, etc.) in a cryptosystem.
Published in Chapter:
Resilience Against False Data Injection Attack in Wireless Sensor Networks
Miao Ma (The Hong Kong University of Science and Technology, Hong Kong)
Copyright: © 2008 |Pages: 8
DOI: 10.4018/978-1-59904-899-4.ch038
Abstract
One of the severe security threats in wireless sensor network is false data injection attack, that is, the compromised sensors forge the events that do not occur. To defend against false data injection attack, six en-route filtering schemes in a homogeneous sensor network are described. Furthermore, one sink filtering scheme in a heterogeneous sensor network is also presented. We find that deploying heterogeneous nodes in a sensor network is an attractive approach because of its potential to increase network lifetime, reliability, and resiliency.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security in Mobile Ad Hoc Networks
The techniques or processes of creating, distributing, and maintaining a secret key, which will be used to protect the secrecy of communications or to ensure the original data are not maliciously altered.
Full Text Chapter Download: US $37.50 Add to Cart
The Emergence of Cryptography in Blockchain Technology
The process of securely producing, storing, and distributing cryptographic keys while maintaining their confidentiality and protecting them from unauthorized access or compromise.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
Any method in information security by which cryptographic keys are exchanged or established between users based use of some cryptographic schemes.
Full Text Chapter Download: US $37.50 Add to Cart
Fruit Fly Optimization-Based Adversarial Modeling for Securing Wireless Sensor Networks (WSN)
It is the process of creating, distributing to the senor nodes before they are deployed in sensor field. Later, it also includes the key refreshment process where cryptographic keys are changed to make the scheme secure against node capture attack.
Full Text Chapter Download: US $37.50 Add to Cart
Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
Process of generating, validating, exchanging, and renewing asymmetric and symmetric keys
Full Text Chapter Download: US $37.50 Add to Cart
Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication
It is collection of different processes required to generate the cryptographic keys, distribution, and setup between the communicating nodes to carry out a secure information exchange.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of Key Management in Mobile Ad Hoc Networks
The process of managing key materials in a cryptosystem which is related to key generation, storage, exchange, update, and replacement
Full Text Chapter Download: US $37.50 Add to Cart
Information Security and Privacy in Medical Application Scenario
Any method in information security by which cryptographic keys are exchanged or established between users based use of some cryptographic schemes.
Full Text Chapter Download: US $37.50 Add to Cart
Routing Security in Wireless Sensor Networks
A scheme to dynamically establish and maintain secure channels among communicating nodes. In wireless sensor networks, a key management scheme must deal with the following important issues: key deployment/key predistribution, key discovery, key establishment/key setup, node addition/rekeying, and node eviction/key revocation.
Full Text Chapter Download: US $37.50 Add to Cart
Key Management in WSN Security: An Attacker's Perspective
It is set of different processes required to generate the cryptographic keys, distribute in the sensor nodes, and setup between the communicating nodes to carry out a secure information exchange.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR