Wireless sensor networks are ubiquitous in monitoring applications, medical control, environmental control and military activities... In fact, a wireless sensor network consists of a set of communicating nodes distributed over an area in order to measure a given magnitude, or receive and transmit data independently to a base station which is connected to the user via the Internet or a satellite, for example. Each node in a sensor network is an electronic device which has calculation capacity, storage, communication and power. However, attacks in wireless sensor networks can have negative impacts on critical network applications leading to the minimization of security within these networks. So it is important to secure these networks in order to maintain their effectiveness. In this paper, we have initially attempted to study approaches oriented towards cryptography and based on elliptic curves, then we have compared the performance of each method relative to others. This approach has a key management model based on the ECC clustering principle using an appropriate algorithm for deployment associated with a secure data transmission [16] in wireless sensor networks.CECKM implements asymmetric key systems using ECC on sensor networks and provides dynamic key synchronization mechanism, fast and effective in network nodes without reconfiguration of all nodes when new nodes arrive or leave from the sensor network. This approach is proposed for dynamic wireless sensor networks and on a larger scale.
C. ECC key management based on an A VL treeKey management should provide a key establishment between all nodes, and must work even if the network topology is not predefmed. Unauthorized nodes cannot perform communication with network nodes.