A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks

  • M. B. Apsara Information Science and Engineering Department, J.S.S Academy of Technical Education, India
  • P. Dayananda Information Science and Engineering Department, J.S.S Academy of Technical Education, India http://orcid.org/0000-0001-8445-3469
  • C. N. Sowmyarani Computer Science and Engineering Department RV College of Engineering, India
Keywords: Wireless Sensor Networks (WSNs), data compression, data aggregation, data gathering, clustering, key management

Abstract

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.

Downloads

Download data is not yet available.

Author Biographies

M. B. Apsara, Information Science and Engineering Department, J.S.S Academy of Technical Education, India

Information Science and Engineering Department, J.S.S Academy of Technical Education, JSSATE-B Campus, Uttarahalli-Kengeri Road, Bengaluru – 560 060, India

P. Dayananda, Information Science and Engineering Department, J.S.S Academy of Technical Education, India

Information Science and Engineering Department, J.S.S Academy of Technical Education, JSSATE-B Campus, Uttarahalli-Kengeri Road, Bengaluru – 560 060, India

C. N. Sowmyarani, Computer Science and Engineering Department RV College of Engineering, India

Computer Science and Engineering Department, RV College of Engineering, Mysore Rd, RV Vidyaniketan, Post, Bengaluru, Karnataka 560059, India

References

W. Jerbi, A. Guermazi, H. Trabelsi, “A novel clustering algorithm for coverage a large scale in Wireless Sensor Networks”, International Journal on Computational Science & Applications, Vol. 6, No. 2, pp. 1-16, 2016

D. Charaan, R. Ramesh, E. Uma, “Energy balanced clustering algorithm on LEACH Protocol for WSN”, International Journal of Innovation and Scientific Research, Vol. 23, No. 2, pp. 293-302, 2016

S. P. Singh, S. C. Sharma, “A novel energy efficient clustering algorithm for Wireless Sensor Networks”, Engineering, Technology & Applied Science Research, Vol. 7, No. 4, pp. 1775-1780, 2017

C. Cao, X. Zhu, “Energy management using Optimal Fuzzy Logic Control in Wireless Sensor Network”, International Journal of Online and Biomedical Engineering, Vol. 14, No. 9, pp. 35-52, 2018

H. N. Dheemanth, “LZW Data Compression”, American Journal of Engineering Research, Vol. 3, No. 2, pp. 22-26, 2014

D. Petrovic, R. C. Shah, K. Ramchandran, J. Rabaey, “Data funneling: routing with aggregation and compression for Wireless Sensor Networks”, IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, USA, May 11, 2003

D. Ye, C. Shen, “Data compression algorithm for Wireless Sensor Networks”, available at: https://pdfs.semanticscholar.org/

dd/f5fe6f7fe396622e25dd3471637fd89d1f40.pdf, 2013

G. Malathy, C. Krishnan, “Data aggregation using RSA key management technique in Wireless Sensor Networks”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, No. 1, pp. 274-277, 2014

H. Anwer Basha, S. Arivalagan, P. Sudhakar, R. P. Narmadha, “A new deterministic code allocation technique for data compression in Wireless Sensor Networks”, International Journal of Recent Technology and Engineering, Vol. 7, No. 5C, pp. 80-86, 2019

A. Diop, Y. Qi, Q. Wang, “Efficient group key management using symmetric key and threshold cryptography for cluster based Wireless Sensor Networks”, I. J. Computer Network and Information Security, Vol. 8, pp. 9-18, 2014

D. Du, H. Xiong, H. Wang, “An efficient key management scheme for Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 406254, 2011

M. R. Juliana, S. Srinivasan “SELADG: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks”, International Journal on Smart Sensing and Intelligent Systems, Vol. 8, No. 3, pp. 1748-1767, 2015

J. Wang, S. Tang, B. Yin, X. Y. Li, “Data gathering in Wireless Sensor Networks through Intelligent Compressive Sensing”, 2012 IEEE Infocom, Orlando, USA, March 25-30, 2012

M. Bayat, M. Reza Aref, “A secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN”, IACR Cryptology ePrint Archive 2013, Article ID 374 2013, 2013

S. Katiyar, S. Rizwan, R. Gujaral, “Network security described technology based on RSA and biometrics for authenticity in WSN”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 2, pp. 328-333, 2016

V. Jayaraj, M. Indhumathi, U. Durai, “Secure data aggregation using efficient key management technique in Wireless Sensor Network”, International Journal of Computer Applications, Vol. 89, No. 9, pp. 6-11, 2014

P. Jilna, P. P. Deepthi, U. K. Jayraj, “Hardware implementation of an efficient key management scheme for Wireless Sensor Networks”, International Journal of Intelligent Computing Research, Vol. 7, No. 1, pp. 663-671, 2016

D. Dhayalan, S. Nandhini, “Certificate less effective key management in dynamic Wireless Sensor Network”, Imperial Journal of Interdisciplinary Research, Vol. 2, No. 4, 2016

A. G. Priyanga, C. Narmadha, “A certificate less active key management in dynamic Wireless Sensor Networks”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 1, pp. 119-123, 2016

Published
2020-02-03
How to Cite
[1]
M. B. Apsara, P. Dayananda, and C. N. Sowmyarani, “A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks”, Eng. Technol. Appl. Sci. Res., vol. 10, no. 1, pp. pp. 5108-5112, Feb. 2020.
Bookmark and Share