Digital Repository

Analysis of key management in wireless sensor networks

Show simple item record

dc.contributor.author Dustin, M. en_US
dc.contributor.author Shankarappa, J. en_US
dc.contributor.author Petrowski, M. en_US
dc.contributor.author Weerasinghe, K.G.H.D. en_US
dc.contributor.author Fu, H. en_US
dc.date.accessioned 2014-11-19T04:50:50Z
dc.date.available 2014-11-19T04:50:50Z
dc.date.issued 2007
dc.identifier.uri http://repository.kln.ac.lk/handle/123456789/4225
dc.description.abstract A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors as the level of secrecy of the data being captured, the amount of computation done to the captured data, and the criticality of the data being available when needed. This paper aims to identify the various types of WSNs in existence today, review some of the key management schemes proposed by the community, and map each type of WSN to a set of these key management schemes that would be ideal to handle the security requirements for that network. Through our research, we aide in solving the question as to whether or not there exists any specific security concerns which are prevalent in a majority of WSNs in use today. en_US
dc.publisher IEEE EIT?07 en_US
dc.title Analysis of key management in wireless sensor networks
dc.type article en_US
dc.identifier.department Information Technology en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account