Survey on key revocation mechanisms in wireless sensor networks

dc.contributor.authorGe, M.
dc.contributor.authorChoo, K.K.R.
dc.contributor.authorHuai, W.
dc.contributor.authorYong, Y.
dc.date.issued2016
dc.description.abstractAs sensor nodes are deployed in an open and hostile environment, they are vulnerable to various attacks. Due to the insecure nature of the environment, it is of critical importance to be able to revoke compromised nodes to ensure the confidentiality of data traversing in the network. Several approaches to resolving the challenges associated with key revocation have been proposed in the past years, which can be broadly categorized into four main classes, namely centralized, distributed, decentralized and hybrid. In this survey, we present an overview of existing key revocation schemes for wireless sensor networks, as well as a comparative summary (e.g. performance and security features). We also investigate rekeying schemes which are not designed for wireless sensor networks. We conclude this paper with a discussion of open research issues.
dc.identifier.citationJournal of Network and Computer Applications, 2016; 63:24-38
dc.identifier.doi10.1016/j.jnca.2016.01.012
dc.identifier.issn1084-8045
dc.identifier.issn1095-8592
dc.identifier.urihttps://hdl.handle.net/11541.2/117507
dc.language.isoen
dc.publisherElsevier
dc.rightsCopyright 2016 Elsevier Ltd.
dc.source.urihttps://doi.org/10.1016/j.jnca.2016.01.012
dc.subjectWireless sensor networks
dc.subjectKey revocation
dc.subjectSurvey of key revocation schemes
dc.titleSurvey on key revocation mechanisms in wireless sensor networks
dc.typeJournal article
pubs.publication-statusPublished
ror.mmsid9916026989601831

Files

Collections