Reference Hub1
A Survey of Dynamic Key Management Schemes in Sensor Networks

A Survey of Dynamic Key Management Schemes in Sensor Networks

Biswajit Panja, Sanjay Kumar Madria
ISBN13: 9781605663289|ISBN10: 160566328X|EISBN13: 9781605663296
DOI: 10.4018/978-1-60566-328-9.ch015
Cite Chapter Cite Chapter

MLA

Panja, Biswajit, and Sanjay Kumar Madria. "A Survey of Dynamic Key Management Schemes in Sensor Networks." Intelligent Techniques for Warehousing and Mining Sensor Network Data, edited by Alfredo Cuzzocrea, IGI Global, 2010, pp. 326-351. https://doi.org/10.4018/978-1-60566-328-9.ch015

APA

Panja, B. & Madria, S. K. (2010). A Survey of Dynamic Key Management Schemes in Sensor Networks. In A. Cuzzocrea (Ed.), Intelligent Techniques for Warehousing and Mining Sensor Network Data (pp. 326-351). IGI Global. https://doi.org/10.4018/978-1-60566-328-9.ch015

Chicago

Panja, Biswajit, and Sanjay Kumar Madria. "A Survey of Dynamic Key Management Schemes in Sensor Networks." In Intelligent Techniques for Warehousing and Mining Sensor Network Data, edited by Alfredo Cuzzocrea, 326-351. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-328-9.ch015

Export Reference

Mendeley
Favorite

Abstract

In sensor networks, the large numbers of tiny sensor nodes communicate remotely or locally among themselves to accomplish a wide range of applications. However, such a network poses serious security protocol design challenges due to ad hoc nature of the communication and the presence of constraints such as limited energy, slower processor speed and small memory size. To secure such a wireless network, the efficient key management techniques are important as existing techniques from mobile ad hoc networks assume resource-equipped nodes. There are some recent security protocols that have been proposed for sensor networks and some of them have also been implemented in a real environment. This chapter provides an overview of research in the area of key management for sensor networks mainly focused on using a cluster head based architecture. First we provide a review of the existing security protocols based on private/public key cryptography, Kerberos, Digital signatures and IP security. Next, the authors investigate some of the existing work on key management protocols for sensor networks along with their advantages and disadvantages. Finally, some new approaches for providing key management, cluster head security and dynamic key computations are explored.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.