International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 150 - Issue 10 |
Published: Sep 2016 |
Authors: Kumail Lakhani, Ashwin Nivangune, T. D. Biradar |
![]() |
Kumail Lakhani, Ashwin Nivangune, T. D. Biradar . Survey on Key Management Schemes for Constraint Environment of WSN. International Journal of Computer Applications. 150, 10 (Sep 2016), 19-23. DOI=10.5120/ijca2016911603
@article{ 10.5120/ijca2016911603, author = { Kumail Lakhani,Ashwin Nivangune,T. D. Biradar }, title = { Survey on Key Management Schemes for Constraint Environment of WSN }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 150 }, number = { 10 }, pages = { 19-23 }, doi = { 10.5120/ijca2016911603 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Kumail Lakhani %A Ashwin Nivangune %A T. D. Biradar %T Survey on Key Management Schemes for Constraint Environment of WSN%T %J International Journal of Computer Applications %V 150 %N 10 %P 19-23 %R 10.5120/ijca2016911603 %I Foundation of Computer Science (FCS), NY, USA
Wireless Sensor Networks (WSN) is becoming the heart of many applications. Data integrity and security is a major issue as the wireless sensor nodes are exposed to harsh and hostile environment. This paper highlights the merits and demerits of different key management schemes under the broader classification of Public Key Infrastructure (PKI), Identity Based Encryption (IBE) and Certificateless Signcryption. These schemes will provide authentication and thereby secure the communication between the nodes considering the constraint environment of the wireless sensor network. Selection of these key management schemes depends upon the application specifications, functionality and computational complexity.