Smart City Gnosys

Smart city article details

Title Review: Secure Key Management Techniques In Iot-Enabled Wireless Sensor Networks
ID_Doc 46540
Authors Srinivas K.; Sagar K.
Year 2024
Published AIP Conference Proceedings, 2971, 1
DOI http://dx.doi.org/10.1063/5.0195860
Abstract with the hasty growth and extensive use of wireless sensor networks (WSNs), it is imperative to enhance the security for WSNs. The concept of the Internet of Things (IoT) is determined by growths of the Internet with the interconnectedness of diversified smart objects using dissimilar networking and communication technologies. Among countless basic networking technologies for the IoT, Wireless Sensor Network (WSN) technology has become an essential building block. IoT empowered sensor networks to afford a wide variety of application areas such as smart homes, smart healthcare, smart cities and various solutions for the manufacturing industry. The incorporation of WSNs in IoT will also generate newfangled security challenges for launching secure channels sandwiched between low power sensor nodes and Internet hosts. The key management is an effective way to protect WSNs from various malicious attacks. This will lead to numerous challenges in designing new key establishment and authentication protocols. This paper discusses about several KMS Taxonomies and surveys and recent KMS which are applicable for WSN. © 2024 Author(s).
Author Keywords Authentication; Internet of Things; Key Management schemes; Wireless Sensor Networks


Similar Articles


Id Similarity Authors Title Published
33253 View0.87Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
33339 View0.869Pundir S.; Wazid M.; Singh D.P.; Das A.K.; Rodrigues J.J.P.C.; Park Y.Intrusion Detection Protocols In Wireless Sensor Networks Integrated To Internet Of Things Deployment: Survey And Future ChallengesIEEE Access, 8 (2020)
23676 View0.868Santhanalakshmi M.; Murthy A.S.D.; Panda M.R.; Prabakaran S.; Rao G.S.; Nidhya M.S.Enhanced Security Model For Heterogeneous Wireless Sensor Networks2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 (2024)
54316 View0.864Kadel A.; Gangakhedkar T.; Patidar Y.; Ghosh A.; Panchal A.; Albalawi N.S.Systematic Literature Review On Security And Privacy Issues On Wsn And IotSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
39136 View0.861Msolli A.; Ajmi N.; Helali A.; Gassoumi A.; Maaref H.; Mghaieth R.New Key Management Scheme Based On Pool-Hash For Wsn And IotJournal of Information Security and Applications, 73 (2023)
4268 View0.86Shabnam; Pandey M.A Review On Iot Based Wireless Sensor Network And SecurityLecture Notes in Networks and Systems, 671 LNNS (2023)
47996 View0.86Chander B.; Gopalakrishnan K.Security Vulnerabilities And Issues Of Traditional Wireless Sensors Networks In IotIntelligent Systems Reference Library, 174 (2019)
47943 View0.856Luqman M.; Faridi A.R.Security In Wireless Sensor Network: A Current LookProceedings of the 2022 9th International Conference on Computing for Sustainable Global Development, INDIACom 2022 (2022)
14421 View0.855Geetha R.; Suntheya A.K.; Srikanth G.U.Cloud Integrated Iot Enabled Sensor Network Security: Research Issues And SolutionsWireless Personal Communications, 113, 2 (2020)
8663 View0.855Reddy D.M.K.; Sathya R.; Lakshmi Y.V.A.S.An Investigative Study On Different Security Aspects Of Wireless Sensor NetworksLecture Notes in Networks and Systems, 1227 LNNS (2025)