On the key revocation schemes in wireless sensor networks
Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in t...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/31626/1/Dieyana_Sakib_GreenCom13.pdf http://irep.iium.edu.my/31626/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.iium.irep.31626 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.316262013-08-28T01:24:41Z http://irep.iium.edu.my/31626/ On the key revocation schemes in wireless sensor networks Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information relating to any compromised network node. While in the literature, key distribution has been extensively studied; key revocation has received relatively little attention. In this paper, we present a survey on the state-of-the-art key revocation techniques and also present the security and performance analysis that highlights the advantages and disadvantages of each scheme. 2013 Conference or Workshop Item REM application/pdf en http://irep.iium.edu.my/31626/1/Dieyana_Sakib_GreenCom13.pdf Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2013) On the key revocation schemes in wireless sensor networks. In: The 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013): Security, Privacy, and Trust Computing Symposium, 20-23 August 2013, Beijing, China. |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan On the key revocation schemes in wireless sensor networks |
description |
Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information relating to any compromised network node. While in the literature, key distribution has been extensively studied; key revocation has received relatively little attention. In this paper, we present a survey on the state-of-the-art key revocation techniques and also present the security and performance analysis that highlights the advantages and disadvantages of each scheme. |
format |
Conference or Workshop Item |
author |
Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan |
author_facet |
Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan |
author_sort |
Mall, Dieynaba |
title |
On the key revocation schemes in wireless sensor networks |
title_short |
On the key revocation schemes in wireless sensor networks |
title_full |
On the key revocation schemes in wireless sensor networks |
title_fullStr |
On the key revocation schemes in wireless sensor networks |
title_full_unstemmed |
On the key revocation schemes in wireless sensor networks |
title_sort |
on the key revocation schemes in wireless sensor networks |
publishDate |
2013 |
url |
http://irep.iium.edu.my/31626/1/Dieyana_Sakib_GreenCom13.pdf http://irep.iium.edu.my/31626/ |
_version_ |
1643610045560127488 |
score |
13.211869 |