International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 150 - Number 10 |
Year of Publication: 2016 |
Authors: Kumail Lakhani, Ashwin Nivangune, T. D. Biradar |
10.5120/ijca2016911603 |
Kumail Lakhani, Ashwin Nivangune, T. D. Biradar . Survey on Key Management Schemes for Constraint Environment of WSN. International Journal of Computer Applications. 150, 10 ( Sep 2016), 19-23. DOI=10.5120/ijca2016911603
Wireless Sensor Networks (WSN) is becoming the heart of many applications. Data integrity and security is a major issue as the wireless sensor nodes are exposed to harsh and hostile environment. This paper highlights the merits and demerits of different key management schemes under the broader classification of Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and Certificateless Signcryption. These schemes will provide authentication and thereby secure the communication between the nodes considering the constraint environment of the wireless sensor network. Selection of these key management schemes depends upon the application specifications, functionality and computational complexity.