Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/843
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorLee, JC-
dc.creatorLeung, VCM-
dc.creatorWong, KH-
dc.creatorCao, J-
dc.creatorChan, H-
dc.date.accessioned2014-12-11T08:23:27Z-
dc.date.available2014-12-11T08:23:27Z-
dc.identifier.issn1536-1284-
dc.identifier.urihttp://hdl.handle.net/10397/843-
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.rights© 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_US
dc.rightsThis material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.en_US
dc.subjectCryptographic protocolsen_US
dc.subjectTechnological forecastingen_US
dc.subjectTelecommunication network planningen_US
dc.subjectTelecommunication securityen_US
dc.subjectWireless sensor networksen_US
dc.titleKey management issues in wireless sensor networks : current proposals and future developmentsen_US
dc.typeJournal/Magazine Articleen_US
dc.description.otherinformationAuthor name used in this publication: Henry C. B. Chanen_US
dc.identifier.spage76-
dc.identifier.epage84-
dc.identifier.volume14-
dc.identifier.issue5-
dc.identifier.doi10.1109/MWC.2007.4396946-
dcterms.abstractKey management has remained a challenging issue in wireless sensor networks (WSNs) due to the constraints of sensor node resources. Various key management schemes that trade off security and operational requirements have been proposed in recent years. In this article, we first examine the security and operational requirements of WSNs and then review five key management protocols: Eschenauer, Du, LEAP, SHELL, and Panja. Eschenauer's scheme is a classical random key distribution scheme for WSNs. Du's scheme improves on Eschenauer's scheme by using key matrices. LEAP provides a highly flexible key management scheme using four types of keys. SHELL focuses on achieving high robustness, and Panja is optimized for hierarchical WSNs. LEAP, SHELL, and Panja support cluster-based operations and are more aligned with current trends as shown by the new standards, IEEE 802.15.4b and the ZigBee "enhanced" standard. Future developments like-ly will incorporate the features of LEAP and adjustable robustness enhancements from Eschenauer or Du; extremely security-critical applications may benefit from restructuring SHELL to ease implementation and maintenance. Developments for extremely large WSNs should consider improving Panja's scheme due to its hierarchical scalability feature.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE wireless communications, Oct. 2007, v. 14, no. 5, p. 76-84-
dcterms.isPartOfIEEE wireless communications-
dcterms.issued2007-10-
dc.identifier.isiWOS:000250239500012-
dc.identifier.scopus2-s2.0-36849034499-
dc.identifier.rosgroupidr39647-
dc.description.ros2007-2008 > Academic research: refereed > Publication in refereed journal-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_IR/PIRAen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
key-management-issues_07.pdf112 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

117
Last Week
5
Last month
Citations as of Jul 3, 2022

Downloads

274
Citations as of Jul 3, 2022

SCOPUSTM   
Citations

58
Last Week
1
Last month
2
Citations as of Jun 30, 2022

WEB OF SCIENCETM
Citations

32
Last Week
0
Last month
0
Citations as of Jun 30, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.