A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks

Authors

  • M. B. Apsara Information Science and Engineering Department, J. S. S. Academy of Technical Education, India
  • P. Dayananda Information Science and Engineering Department, J. S. S. Academy of Technical Education, India http://orcid.org/0000-0001-8445-3469
  • C. N. Sowmyarani Computer Science and Engineering Department, RV College of Engineering, India
Volume: 10 | Issue: 1 | Pages: 5108-5112 | February 2020 | https://doi.org/10.48084/etasr.3213

Abstract

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.

Keywords:

Wireless Sensor Networks (WSNs), data compression, data aggregation, data gathering, clustering, key management

Downloads

Download data is not yet available.

Author Biography

C. N. Sowmyarani, Computer Science and Engineering Department, RV College of Engineering, India

Computer Science and Engineering Department, RV College of Engineering, Mysore Rd, RV Vidyaniketan, Post, Bengaluru, Karnataka 560059, India

References

W. Jerbi, A. Guermazi, H. Trabelsi, “A novel clustering algorithm for coverage a large scale in Wireless Sensor Networks”, International Journal on Computational Science & Applications, Vol. 6, No. 2, pp. 1-16, 2016 DOI: https://doi.org/10.5121/ijcsa.2016.6201

D. Charaan, R. Ramesh, E. Uma, “Energy balanced clustering algorithm on LEACH Protocol for WSN”, International Journal of Innovation and Scientific Research, Vol. 23, No. 2, pp. 293-302, 2016

S. P. Singh, S. C. Sharma, “A novel energy efficient clustering algorithm for Wireless Sensor Networks”, Engineering, Technology & Applied Science Research, Vol. 7, No. 4, pp. 1775-1780, 2017 DOI: https://doi.org/10.48084/etasr.1277

C. Cao, X. Zhu, “Energy management using Optimal Fuzzy Logic Control in Wireless Sensor Network”, International Journal of Online and Biomedical Engineering, Vol. 14, No. 9, pp. 35-52, 2018 DOI: https://doi.org/10.3991/ijoe.v14i09.8896

H. N. Dheemanth, “LZW Data Compression”, American Journal of Engineering Research, Vol. 3, No. 2, pp. 22-26, 2014

D. Petrovic, R. C. Shah, K. Ramchandran, J. Rabaey, “Data funneling: routing with aggregation and compression for Wireless Sensor Networks”, IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, USA, May 11, 2003

D. Ye, C. Shen, “Data compression algorithm for Wireless Sensor Networks”, available at: https://pdfs.semanticscholar.org/

dd/f5fe6f7fe396622e25dd3471637fd89d1f40.pdf, 2013

G. Malathy, C. Krishnan, “Data aggregation using RSA key management technique in Wireless Sensor Networks”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, No. 1, pp. 274-277, 2014

H. Anwer Basha, S. Arivalagan, P. Sudhakar, R. P. Narmadha, “A new deterministic code allocation technique for data compression in Wireless Sensor Networks”, International Journal of Recent Technology and Engineering, Vol. 7, No. 5C, pp. 80-86, 2019

A. Diop, Y. Qi, Q. Wang, “Efficient group key management using symmetric key and threshold cryptography for cluster based Wireless Sensor Networks”, I. J. Computer Network and Information Security, Vol. 8, pp. 9-18, 2014 DOI: https://doi.org/10.5815/ijcnis.2014.08.02

D. Du, H. Xiong, H. Wang, “An efficient key management scheme for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 406254, 2011 DOI: https://doi.org/10.1155/2012/406254

M. R. Juliana, S. Srinivasan “SELADG: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 8, No. 3, pp. 1748-1767, 2015 DOI: https://doi.org/10.21307/ijssis-2017-828

J. Wang, S. Tang, B. Yin, X. Y. Li, “Data gathering in Wireless Sensor Networks through Intelligent Compressive Sensing”, 2012 IEEE Infocom, Orlando, USA, March 25-30, 2012 DOI: https://doi.org/10.1109/INFCOM.2012.6195803

M. Bayat, M. Reza Aref, “A secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN”, IACR Cryptology ePrint Archive 2013, Article ID 374 2013, 2013

S. Katiyar, S. Rizwan, R. Gujaral, “Network security described technology based on RSA and biometrics for authenticity in WSN”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 2, pp. 328-333, 2016

V. Jayaraj, M. Indhumathi, U. Durai, “Secure data aggregation using efficient key management technique in Wireless Sensor Network”, International Journal of Computer Applications, Vol. 89, No. 9, pp. 6-11, 2014 DOI: https://doi.org/10.5120/15528-4289

P. Jilna, P. P. Deepthi, U. K. Jayraj, “Hardware implementation of an efficient key management scheme for Wireless Sensor Networks”, International Journal of Intelligent Computing Research, Vol. 7, No. 1, pp. 663-671, 2016 DOI: https://doi.org/10.20533/ijicr.2042.4655.2016.0082

D. Dhayalan, S. Nandhini, “Certificate less effective key management in dynamic Wireless Sensor Network”, Imperial Journal of Interdisciplinary Research, Vol. 2, No. 4, 2016

A. G. Priyanga, C. Narmadha, “A certificate less active key management in dynamic Wireless Sensor Networks”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 1, pp. 119-123, 2016 DOI: https://doi.org/10.17148/IJARCCE.2016.5129

Downloads

How to Cite

[1]
M. B. Apsara, P. Dayananda, and C. N. Sowmyarani, “A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks”, Eng. Technol. Appl. Sci. Res., vol. 10, no. 1, pp. 5108–5112, Feb. 2020.

Metrics

Abstract Views: 477
PDF Downloads: 326

Metrics Information
Bookmark and Share