Analysis of key management in wireless sensor networks

dc.contributor.authorDustin, M.en_US
dc.contributor.authorShankarappa, J.en_US
dc.contributor.authorPetrowski, M.en_US
dc.contributor.authorWeerasinghe, K.G.H.D.en_US
dc.contributor.authorFu, H.en_US
dc.date.accessioned2014-11-19T04:50:50Z
dc.date.available2014-11-19T04:50:50Z
dc.date.issued2007
dc.description.abstractA multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors as the level of secrecy of the data being captured, the amount of computation done to the captured data, and the criticality of the data being available when needed. This paper aims to identify the various types of WSNs in existence today, review some of the key management schemes proposed by the community, and map each type of WSN to a set of these key management schemes that would be ideal to handle the security requirements for that network. Through our research, we aide in solving the question as to whether or not there exists any specific security concerns which are prevalent in a majority of WSNs in use today.en_US
dc.identifier.departmentInformation Technologyen_US
dc.identifier.urihttp://repository.kln.ac.lk/handle/123456789/4225
dc.publisherIEEE EIT?07en_US
dc.titleAnalysis of key management in wireless sensor networks
dc.typearticleen_US

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: