Deakin University
Browse

Survey on key revocation mechanisms in wireless sensor networks

Version 2 2024-06-13, 13:24
Version 1 2019-11-18, 11:37
journal contribution
posted on 2024-06-13, 13:24 authored by M Ge, KKR Choo, H Wu, Y Yu
© 2016 Elsevier Ltd. All rights reserved. As sensor nodes are deployed in an open and hostile environment, they are vulnerable to various attacks. Due to the insecure nature of the environment, it is of critical importance to be able to revoke compromised nodes to ensure the confidentiality of data traversing in the network. Several approaches to resolving the challenges associated with key revocation have been proposed in the past years, which can be broadly categorized into four main classes, namely centralized, distributed, decentralized and hybrid. In this survey, we present an overview of existing key revocation schemes for wireless sensor networks, as well as a comparative summary (e.g. performance and security features). We also investigate rekeying schemes which are not designed for wireless sensor networks. We conclude this paper with a discussion of open research issues.

History

Journal

Journal of Network and Computer Applications

Volume

63

Pagination

24-38

Location

Amsterdam, The Netherlands

ISSN

1084-8045

eISSN

1095-8592

Language

eng

Publication classification

C1.1 Refereed article in a scholarly journal

Publisher

Elsevier

Usage metrics

    Research Publications

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC