Call for Papers
About the Journal
Editorial Board
Publication Ethics
Instructions for Authors
Announcements
Current Issue
Back Issues
Search for Articles
Categories
Back Issues
 

JCSE, vol. 4, no. 1, pp.23-51, March, 2010

DOI:

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

Syed Muhammad Khaliq-ur-Rahman Raazi, Sungyoung Lee
Department of Computer Engineering, Kyung Hee University (Global Campus), Korea

Abstract: Wireless Sensor Networks (WSN) have proved to be useful in applications that involvemonitoring of real-time data. There is a wide variety of monitoring applications that can employWireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend uponthe application, for which it is employed. Security requirements in WSN vary according to theapplication dependent network characteristics and the characteristics of an application itself.Key management is the most important aspect of security as some other security modulesdepend on it. We discuss application dependent variations in WSN, corresponding changes inthe security requirements of WSN and the applicability of existing key management solutionsin each scenario.

Keyword: No keyword

Full Paper:   386 Downloads, 4235 View

 
 
ⓒ Copyright 2010 KIISE – All Rights Reserved.    
Korean Institute of Information Scientists and Engineers (KIISE)   #401 Meorijae Bldg., 984-1 Bangbae 3-dong, Seo-cho-gu, Seoul 137-849, Korea
Phone: +82-2-588-9240    Fax: +82-2-521-1352    Homepage: http://jcse.kiise.org    Email: office@kiise.org