Survey on Key Management Schemes for Constraint Environment of WSN

Kumail Lakhani, Ashwin Nivangune, T. D.
2016 International Journal of Computer Applications  
Wireless Sensor Networks (WSN) is becoming the heart of many applications. Data integrity and security is a major issue as the wireless sensor nodes are exposed to harsh and hostile environment. This paper highlights the merits and demerits of different key management schemes under the broader classification of Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and Certificateless Signcryption. These schemes will provide authentication and thereby secure the communication between
more » ... he nodes considering the constraint environment of the wireless sensor network. Selection of these key management schemes depends upon the application specifications, functionality and computational complexity.
doi:10.5120/ijca2016911603 fatcat:wykxkicy3zhzxevb5totaubqk4