Effective hotspot storage management schemes in wireless sensor networks

2008 ◽  
Vol 31 (10) ◽  
pp. 2131-2141 ◽  
Author(s):  
Wen-Hwa Liao ◽  
Wan-Chi Wu
2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


Author(s):  
Riaz Ahmed Shaikh ◽  
Brian J. dAuriol ◽  
Heejo Lee ◽  
Sungyoung Lee

Until recently, researchers have focused on the cryptographic-based security issues more intensively than the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solution. In this chapter, we present generic and flexible taxonomies of privacy and trust. We also give detailed critical analyses of the state-of-the-art research, in the field of privacy and trust that is currently not available in the literature. This chapter also highlights the challenging issues and problems.


Majority of the applications demand confidentiality and integrity of the shared information using Wireless Sensor Networks (WSNs). Key management schemes are one of the core concepts that ensure the security of WSNs. Prior key management schemes failed to provide required security arrangements in WSNs. Authentication is the core parameters that assess the capability of the deployed sensor nodes in the communication fields. In this paper, we review the existing authentication protocols by stating its merits and demerits. It is observed that the need for a secure and efficient authentication protocol is still in demand, owing to the real issues like identity overheads, information retrieval and location mining. This paper will assist the upcoming researchers to have an insight into the significance of lightweight authentication protocols in WSNs.


2010 ◽  
pp. 297-316
Author(s):  
SYED KHALIQ-UR-RAHMAN RAAZI ◽  
ZEESHAN PERVEZ ◽  
SUNGYOUNG LEE

Sign in / Sign up

Export Citation Format

Share Document