Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
Key management in wireless sensor network (WSN) includes two important aspects namely key distribution, which constitutes the task of distributing secret keys to nodes in the network, and key revocation, which refers to the task of securely withdrawing the key information relating to any compromised...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
Inderscience Publishers
2015
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/42088/ http://irep.iium.edu.my/42088/ http://irep.iium.edu.my/42088/1/IJAHUC_18%281-2%29_Paper_02.pdf http://irep.iium.edu.my/42088/4/42080_Key%20revocation%20in%20wireless%20sensor%20networks_Scopus.pdf http://irep.iium.edu.my/42088/5/42080_Key%20revocation%20in%20wireless%20sensor%20networks_WOS.pdf |
id |
iium-42088 |
---|---|
recordtype |
eprints |
spelling |
iium-420882017-11-03T03:29:36Z http://irep.iium.edu.my/42088/ Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan QA75 Electronic computers. Computer science Key management in wireless sensor network (WSN) includes two important aspects namely key distribution, which constitutes the task of distributing secret keys to nodes in the network, and key revocation, which refers to the task of securely withdrawing the key information relating to any compromised node or because of tactical reasons. While in the existing literature, key distribution has been extensively studied, key revocation has received relatively little attention. A vital security issue like this needs proper recognition to be considered as a critical research area, not just as a partial segment of key management. With this motivation, in this paper, we present our rationale behind recognising the area and analyse the state-of-the-art key revocation techniques. Alongside our survey on the prominent schemes, we also present an analysis of security and performance that highlights the advantages and disadvantages of each scheme that explicitly mentions the method of key revocation. Inderscience Publishers 2015 Article PeerReviewed application/pdf en http://irep.iium.edu.my/42088/1/IJAHUC_18%281-2%29_Paper_02.pdf application/pdf en http://irep.iium.edu.my/42088/4/42080_Key%20revocation%20in%20wireless%20sensor%20networks_Scopus.pdf application/pdf en http://irep.iium.edu.my/42088/5/42080_Key%20revocation%20in%20wireless%20sensor%20networks_WOS.pdf Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2015) Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1/2). pp. 3-22. ISSN 1743-8233 (O) 1743-8225 (P) http://www.inderscience.com/info/inarticle.php?artid=67789 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
description |
Key management in wireless sensor network (WSN) includes two important aspects namely key distribution, which constitutes the task of distributing secret keys to nodes in the network, and key revocation, which refers to the task of securely withdrawing the key information relating to any compromised node or because of tactical reasons. While in the existing literature, key distribution has been extensively studied, key revocation has received relatively little attention. A vital security issue like this needs proper recognition to be considered as a critical research area, not just as a partial segment of key management. With this motivation, in this paper, we present our rationale behind recognising the area and analyse the state-of-the-art key revocation techniques. Alongside our survey on the prominent schemes, we also present an analysis of security and performance that highlights the advantages and disadvantages of each scheme that explicitly mentions the method of key revocation. |
format |
Article |
author |
Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan |
author_facet |
Mall, Dieynaba Konaté, Karim Pathan, Al-Sakib Khan |
author_sort |
Mall, Dieynaba |
title |
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
title_short |
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
title_full |
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
title_fullStr |
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
title_full_unstemmed |
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
title_sort |
key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue |
publisher |
Inderscience Publishers |
publishDate |
2015 |
url |
http://irep.iium.edu.my/42088/ http://irep.iium.edu.my/42088/ http://irep.iium.edu.my/42088/1/IJAHUC_18%281-2%29_Paper_02.pdf http://irep.iium.edu.my/42088/4/42080_Key%20revocation%20in%20wireless%20sensor%20networks_Scopus.pdf http://irep.iium.edu.my/42088/5/42080_Key%20revocation%20in%20wireless%20sensor%20networks_WOS.pdf |
first_indexed |
2023-09-18T21:00:03Z |
last_indexed |
2023-09-18T21:00:03Z |
_version_ |
1777410563289120768 |