IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Gazi University Journal of Science
  • Volume:25 Issue:2
  • Performance Evaluation of Key Management Schemes in Wireless Sensor Networks

Performance Evaluation of Key Management Schemes in Wireless Sensor Networks

Authors : Suat OZDEMIR, Önder KHALIL
Pages : 465-476
View : 21 | Download : 9
Publication Date : 2012-04-16
Article Type : Other Papers
Abstract :Wireless sensor networks usually consist of a large number of ultra-small autonomous devices. Each device, called sensor node, is battery powered and equipped with integrated sensors, a data processing unit, and a short-range radio communication unit. Sensor nodes are significantly constrained in terms of energy, memory, and computational capacity. Wireless sensor networks are being deployed in wide variety of applications, including military sensing and tracking, environment monitoring, patient monitoring and tracking, smart environments, etc. When a wireless sensor network is deployed in such hostile environment, security becomes an extremely important issue. Confidentiality, authenticity, availability, and integrity are typical security goals for wireless sensor networks. Providing these goals to secure communication among sensor nodes typically depends on the use of cryptographic schemes. When employing a cryptographic scheme, a key management service is always required. This paper investigates the most important key management schemes in wireless sensor networks. Namely, single network-wide key scheme, pairwise key establishment scheme, random key predistribution, and Q-composite random key predistribution schemes are explained in detail. These key management schemes are evaluated using OMNET++ simulator and extensive simulation results are presented. 
Keywords : key management, security, wireless sensor networks

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025