Secure Key Establishment in Wireless Sensor Networks

Secure Key Establishment in Wireless Sensor Networks

Suman Bala, Gaurav Sharma, Anil K. Verma
ISBN13: 9781522501053|ISBN10: 1522501053|EISBN13: 9781522501060
DOI: 10.4018/978-1-5225-0105-3.ch015
Cite Chapter Cite Chapter

MLA

Bala, Suman, et al. "Secure Key Establishment in Wireless Sensor Networks." Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, et al., IGI Global, 2016, pp. 342-367. https://doi.org/10.4018/978-1-5225-0105-3.ch015

APA

Bala, S., Sharma, G., & Verma, A. K. (2016). Secure Key Establishment in Wireless Sensor Networks. In B. Gupta, D. Agrawal, & S. Yamaguchi (Eds.), Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 342-367). IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.ch015

Chicago

Bala, Suman, Gaurav Sharma, and Anil K. Verma. "Secure Key Establishment in Wireless Sensor Networks." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, 342-367. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0105-3.ch015

Export Reference

Mendeley
Favorite

Abstract

Over the last two decades, advancement in pervasive sensing, embedded computing and wireless communication has lead an attention to a new research area of engineered systems termed as Cyber-Physical Systems (CPS). CPS has bridged the gap between the physical world to the cyber world. It is envisioned that Wireless Sensor Networks (WSN) plays an important role in the actuality of CPS. Due to wireless communication in WSN, it is more vulnerable to security threats. Key establishment is an approach, which is responsible for establishing a session between two communicating parties and therefore, a lightweight key establishment scheme is essential. In this chapter, we review the state of the art of these solutions by discussing key establishment in WSN. Also, a discussion has been carried out to capture few challenges in implementing them in real and future research directions in this area are explored to transport the field to an improved level.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.