DocumentCode
653173
Title
On the Key Revocation Schemes in Wireless Sensor Networks
Author
Mall, Dieynaba ; Konate, Karim ; Pathan, Al-Sakib Khan
Author_Institution
Dept. of Math. & Comput. Sci., Univ. Cheikh Anta Diop de Dakar, Dakar, Senegal
fYear
2013
fDate
20-23 Aug. 2013
Firstpage
290
Lastpage
297
Abstract
Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information relating to any compromised network node. While in the literature, key distribution has been extensively studied, key revocation has received relatively little attention. In this paper, we present a survey on the state-of-the-art key revocation techniques and also present the security and performance analysis that highlights the advantages and disadvantages of each scheme.
Keywords
private key cryptography; wireless sensor networks; key distribution; key management; key revocation; performance analysis; secret keys; wireless sensor networks; Authentication; Encryption; Polynomials; Protocols; Wireless sensor networks; Key; Management; Revocation; Security; Sensor; Wireless;
fLanguage
English
Publisher
ieee
Conference_Titel
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
Conference_Location
Beijing
Type
conf
DOI
10.1109/GreenCom-iThings-CPSCom.2013.66
Filename
6682080
Link To Document