2021
DOI: 10.1007/s42452-020-04089-9
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

Abstract: Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications. Any damage or compromise to data security could have physical and direct effects on network efficiency and safety. One of the active areas of research is key management, authentication, and trust management in wireless sensor networks (WSN). Since researchers have provided many protection schemes, it is difficult to select which key management or trust management s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(25 citation statements)
references
References 88 publications
0
25
0
Order By: Relevance
“…Despite the needed efforts, the feature is worth considering, particularly for cooperative WSANs [ 11 ]. First, it allows the node to verify the trustworthiness of its neighbor nodes such that the data received from them can be used for own purposes (e.g., calibration).…”
Section: Related Workmentioning
confidence: 99%
“…Despite the needed efforts, the feature is worth considering, particularly for cooperative WSANs [ 11 ]. First, it allows the node to verify the trustworthiness of its neighbor nodes such that the data received from them can be used for own purposes (e.g., calibration).…”
Section: Related Workmentioning
confidence: 99%
“…Symmetric cryptography is efficient but requires complex procedures for key management. Several surveys [35], [36] have pointed out the difficulties of existing key management schemes. Besides the loss of privacy, disclosure of symmetric keys is dangerous since many systems interpret their possession as implicit authentication.…”
Section: Related Workmentioning
confidence: 99%
“…It signifies the confidentiality of the patients’ sensitive data. Moreover, authentication and key agreement is also needed [ 26 ]. In that respect, Mitev et al [ 27 ] had proposed a secret key generation method on wireless systems.…”
Section: Introductionmentioning
confidence: 99%