Research Article
A Survey of Key Negotiation and Authentication Systems in WSNs
@ARTICLE{10.4108/eai.10-4-2018.154445, author={Mohammad Tehseen and Huma Javed and Ishtiaq Hussain Shah and Sheeraz Ahmed }, title={A Survey of Key Negotiation and Authentication Systems in WSNs}, journal={EAI Endorsed Transactions on Energy Web and Information Technologies}, volume={5}, number={17}, publisher={EAI}, journal_a={EW}, year={2018}, month={4}, keywords={Wireless sensor networks, Elliptic Curve Cryptography, Symmetric and Asymmetric Cryptography,}, doi={10.4108/eai.10-4-2018.154445} }
- Mohammad Tehseen
Huma Javed
Ishtiaq Hussain Shah
Sheeraz Ahmed
Year: 2018
A Survey of Key Negotiation and Authentication Systems in WSNs
EW
EAI
DOI: 10.4108/eai.10-4-2018.154445
Abstract
Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.
Copyright © 2018 Mohammad Tehseen et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.