A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.
Keywords:Wireless Sensor Networks (WSNs), data compression, data aggregation, data gathering, clustering, key management
W. Jerbi, A. Guermazi, H. Trabelsi, “A novel clustering algorithm for coverage a large scale in Wireless Sensor Networks”, International Journal on Computational Science & Applications, Vol. 6, No. 2, pp. 1-16, 2016 DOI: https://doi.org/10.5121/ijcsa.2016.6201
D. Charaan, R. Ramesh, E. Uma, “Energy balanced clustering algorithm on LEACH Protocol for WSN”, International Journal of Innovation and Scientific Research, Vol. 23, No. 2, pp. 293-302, 2016
S. P. Singh, S. C. Sharma, “A novel energy efficient clustering algorithm for Wireless Sensor Networks”, Engineering, Technology & Applied Science Research, Vol. 7, No. 4, pp. 1775-1780, 2017 DOI: https://doi.org/10.48084/etasr.1277
C. Cao, X. Zhu, “Energy management using Optimal Fuzzy Logic Control in Wireless Sensor Network”, International Journal of Online and Biomedical Engineering, Vol. 14, No. 9, pp. 35-52, 2018 DOI: https://doi.org/10.3991/ijoe.v14i09.8896
H. N. Dheemanth, “LZW Data Compression”, American Journal of Engineering Research, Vol. 3, No. 2, pp. 22-26, 2014
D. Petrovic, R. C. Shah, K. Ramchandran, J. Rabaey, “Data funneling: routing with aggregation and compression for Wireless Sensor Networks”, IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, USA, May 11, 2003
D. Ye, C. Shen, “Data compression algorithm for Wireless Sensor Networks”, available at: https://pdfs.semanticscholar.org/
G. Malathy, C. Krishnan, “Data aggregation using RSA key management technique in Wireless Sensor Networks”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, No. 1, pp. 274-277, 2014
H. Anwer Basha, S. Arivalagan, P. Sudhakar, R. P. Narmadha, “A new deterministic code allocation technique for data compression in Wireless Sensor Networks”, International Journal of Recent Technology and Engineering, Vol. 7, No. 5C, pp. 80-86, 2019
A. Diop, Y. Qi, Q. Wang, “Efficient group key management using symmetric key and threshold cryptography for cluster based Wireless Sensor Networks”, I. J. Computer Network and Information Security, Vol. 8, pp. 9-18, 2014 DOI: https://doi.org/10.5815/ijcnis.2014.08.02
D. Du, H. Xiong, H. Wang, “An efficient key management scheme for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 406254, 2011 DOI: https://doi.org/10.1155/2012/406254
M. R. Juliana, S. Srinivasan “SELADG: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 8, No. 3, pp. 1748-1767, 2015 DOI: https://doi.org/10.21307/ijssis-2017-828
J. Wang, S. Tang, B. Yin, X. Y. Li, “Data gathering in Wireless Sensor Networks through Intelligent Compressive Sensing”, 2012 IEEE Infocom, Orlando, USA, March 25-30, 2012 DOI: https://doi.org/10.1109/INFCOM.2012.6195803
M. Bayat, M. Reza Aref, “A secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN”, IACR Cryptology ePrint Archive 2013, Article ID 374 2013, 2013
S. Katiyar, S. Rizwan, R. Gujaral, “Network security described technology based on RSA and biometrics for authenticity in WSN”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 2, pp. 328-333, 2016
V. Jayaraj, M. Indhumathi, U. Durai, “Secure data aggregation using efficient key management technique in Wireless Sensor Network”, International Journal of Computer Applications, Vol. 89, No. 9, pp. 6-11, 2014 DOI: https://doi.org/10.5120/15528-4289
P. Jilna, P. P. Deepthi, U. K. Jayraj, “Hardware implementation of an efficient key management scheme for Wireless Sensor Networks”, International Journal of Intelligent Computing Research, Vol. 7, No. 1, pp. 663-671, 2016 DOI: https://doi.org/10.20533/ijicr.2042.4655.2016.0082
D. Dhayalan, S. Nandhini, “Certificate less effective key management in dynamic Wireless Sensor Network”, Imperial Journal of Interdisciplinary Research, Vol. 2, No. 4, 2016
A. G. Priyanga, C. Narmadha, “A certificate less active key management in dynamic Wireless Sensor Networks”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 1, pp. 119-123, 2016 DOI: https://doi.org/10.17148/IJARCCE.2016.5129
How to Cite
MetricsAbstract Views: 477
PDF Downloads: 326
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.