Reference Hub1
Key Management in WSN Security: An Attacker's Perspective

Key Management in WSN Security: An Attacker's Perspective

Priyanka Ahlawat, Mayank Dave
ISBN13: 9781522573357|ISBN10: 1522573356|EISBN13: 9781522573364
DOI: 10.4018/978-1-5225-7335-7.ch015
Cite Chapter Cite Chapter

MLA

Ahlawat, Priyanka, and Mayank Dave. "Key Management in WSN Security: An Attacker's Perspective." Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, IGI Global, 2019, pp. 303-325. https://doi.org/10.4018/978-1-5225-7335-7.ch015

APA

Ahlawat, P. & Dave, M. (2019). Key Management in WSN Security: An Attacker's Perspective. In S. Singh & R. Mohan Sharma (Eds.), Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 303-325). IGI Global. https://doi.org/10.4018/978-1-5225-7335-7.ch015

Chicago

Ahlawat, Priyanka, and Mayank Dave. "Key Management in WSN Security: An Attacker's Perspective." In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, edited by Surjit Singh and Rajeev Mohan Sharma, 303-325. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7335-7.ch015

Export Reference

Mendeley
Favorite

Abstract

To create a secure communication among the sensor nodes, a key establishment scheme is very important. Wireless sensor networks (WSN) are usually left unattended and thus may attract the adversary to launch several attacks to the network operation. The exposure of the key during a node capture may disturb a large part of network communication. If there is a reliable, efficient, and secure KMS, disruption in the network to such an extent may not occur during a node capture attack. Several researchers have presented several key agreement schemes, but still the area is open to design an efficient attack resistant KMS. Sometimes, during the design of security protocols, the assumptions taken for the adversary behavior in sensor field may not reflect their actual behavior of the adversary in sensor field making these schemes less feasible in many real-world WSN applications. This chapter first discusses the challenges and security requirements, node capture attacks, its impact on the network, and some open issues of KMS solutions to this problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.