A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 106 | Weekly Hits: ⮙6 | Monthly Hits: ⮙9

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

To achieve security in wireless sensor networks, it is important tobe able to encrypt and authenticate messages sent among sensornodes. Keys for encryption and authentication purposes must beagreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Dife-Hellman and public-key based schemes, are not suit-able for wireless sensor networks. Pre-distribution of secret keysfor all pairs of nodes is not viable due to the large amount of mem-ory used when the network size is large. To solve the key pre-distribution problem, two elegant key pre-distribution approacheshave been proposed recently [11, 7].

Keywords: Security, Key establishment, Mobile sensor networks, Key prioritization, Post-deployment knowledge

Edition: Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

Share this Article

How to Cite this Article?

Dinesh Dhakar, Ravi Khatri, "A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155760, Volume 4 Issue 6, June 2015, 1658 - 1660

Enter Your Registered Email Address





Similar Articles with Keyword 'Security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Similar Articles with Keyword 'Key establishment'

Downloads: 102 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2075 - 2077

Node Clone Detection with Scalable Key Pre-Distribution Scheme for WSN

Rekha V. Aher, Sunita Nandagave

Share this Article

Downloads: 106 | Weekly Hits: ⮙6 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 106 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this Article

Downloads: 107 | Weekly Hits: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Similar Articles with Keyword 'Mobile sensor networks'

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2718 - 2722

Improving Target Coverage and Network Connectivity of Mobile Sensor Networks

Sonali Karegaonkar, Archana Raut

Share this Article

Downloads: 106 | Weekly Hits: ⮙6 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 107 | Weekly Hits: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this Article

Similar Articles with Keyword 'Key prioritization'

Downloads: 106 | Weekly Hits: ⮙6 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 107 | Weekly Hits: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article

Similar Articles with Keyword 'Post-deployment knowledge'

Downloads: 106 | Weekly Hits: ⮙6 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

Downloads: 107 | Weekly Hits: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this Article



Top