Downloads: 103 | Views: 314 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.9 / 10
Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Abstract: Wireless sensor networks (WSN) are always prone to security threats and they do have a wide range of applications. Key management is a serious issue while communications through wireless sensor networks take place. Traditional network security methods are not up to the mark due to limited resources. Several key management has been proposed and few of which have been summarized below. The basic method used in homogeneous sensor networks used symmetric keys which then progressed to the use of asymmetric keys. Due to the energy constraints, the concept of heterogeneous wireless sensor networks with high and low energy sensors was developed. A combination of symmetric and asymmetric keys were tried and obtained better results like security, scalability and connectivity.
Keywords: WSN, Key management
Edition: Volume 3 Issue 12, December 2014
Pages: 1728 - 1731
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 717 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 697 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 697 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 686 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera