Survey on Efficient Key Pre-Distribution Scheme for Wireless Sensor Network |
Author(s): |
Jeenyta Desai , Hasmukh Goswami College of Engineering, Vahlal, Ahemdabad; Indr Jeet Rajput, Hasmukh Goswami College of Engineering, Vahlal, Ahemdabad |
Keywords: |
Connectivity, Resiliency, WSN, constraints |
Abstract |
Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications Wireless Sensor Networks is growing day by day and also its Security is a burning issue. at the same time, offer numerous challenges energy constraints, size of hardware, computational cost and power utilization to which sensing nodes are typically subjected. And for security, Key Management is a challenging issue. Key pre-distribution schemes are evolved in order to achieve performance. The security requirements like Global connectivity, Local Connectivity, Resiliency Key Sharing Probability and Network Scalability are to be Surveyed. A wireless sensor network (WSN) has important applications such the use of sensor networks was first limited to Military applications only but now it has its wings spread over civilian applications such as Health monitoring, Industries, environmental sensing, target tracking, wild life monitoring and communications on commercial scale and also remote environmental monitoring. Result is the availability, particularly in recent years, of sensors that are smaller, cheaper, intelligent and faster. Since Wireless Sensor Networks have become popular in recent past. A lot of research has been carried out in this field to improve hardware specifications, protocols for communications and information security. The goal of our survey is to present a comprehensive review of the recent literature on the protocols and the constrains which they are effecting. Gathering information for the protocols working and survey on how they are improved than the others and which factors are to altered to further improve them. We are so, giving a survey on the protocols used for security and the factor they effect. |
Other Details |
Paper ID: IJSRDV2I10298 Published in: Volume : 2, Issue : 10 Publication Date: 01/01/2015 Page(s): 331-334 |
Article Preview |
|
|