ew 18(17): e3

Research Article

A Survey of Key Negotiation and Authentication Systems in WSNs

Download918 downloads
  • @ARTICLE{10.4108/eai.10-4-2018.154445,
        author={Mohammad  Tehseen and Huma  Javed and Ishtiaq  Hussain Shah and Sheeraz  Ahmed },
        title={A Survey of Key Negotiation and Authentication Systems in WSNs},
        journal={EAI Endorsed Transactions on Energy Web and Information Technologies},
        volume={5},
        number={17},
        publisher={EAI},
        journal_a={EW},
        year={2018},
        month={4},
        keywords={Wireless sensor networks, Elliptic Curve Cryptography, Symmetric and Asymmetric Cryptography,},
        doi={10.4108/eai.10-4-2018.154445}
    }
    
  • Mohammad Tehseen
    Huma Javed
    Ishtiaq Hussain Shah
    Sheeraz Ahmed
    Year: 2018
    A Survey of Key Negotiation and Authentication Systems in WSNs
    EW
    EAI
    DOI: 10.4108/eai.10-4-2018.154445
Mohammad Tehseen1,*, Huma Javed1, Ishtiaq Hussain Shah1, Sheeraz Ahmed 2
  • 1: Department of Computer Science, University of Peshawar
  • 2: Gomal University, Department of Electrical Engineering
*Contact email: Khanto_tsn@yahoo.com

Abstract

Wireless Sensor Networks (WSNs) is a type of adhoc network that is use to sense some phenomena with the help of sensor nodes. The nodes have scarce resources like power, storage, processing power, sensing and communication. Now a day WSNs are helping as a main constituting component for variety of applications like intelligence gathering, battle field monitoring, pollution mapping, smart cities, smart homes and health care monitoring systems etc. To make such system a reality and work with reliability, data security needs a lot of attention to be handled properly. Due to scarce resources in WSNs, implementation of proper security technique is not quite simple rather it is a challenging task to accomplish. Huge number of security algorithms have been proposed for WSNs, but among them network wide master key based security systems are more appropriate due to less overhead in establishing a secure channel. In this survey different security solution such as LEAP, BROSK, Spins, C & R, Light Weight Authentication Systems and ECC are investigated to study the impact of physical attack on them.