Cluster Based Key Revocation and Key Distribution in Wireless Sensor Network a Survey
Nimisha C. Chaudhari
Ms. Nimisha Chaudhari, LDRP Institute of Technology and Research, Gandhinagar (Gujrat), India.
Manuscript received on March 12, 2013. | Revised Manuscript received on April 11, 2013. | Manuscript published on April 30, 2013. | PP: 547-549 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1533042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Key management has become a challenging issue in the design and deployment of secure wireless sensor networks. key management includes two aspects: key distribution and key revocation. Key distribution refers to the task of distributing secret keys between communicating parties to provide secrecy and authentication. Key revocation refers to the task of securely removing compromised keys. By revoking all of the keys of a compromised sensor node, the node can be removed from the network. Compared to key distribution, Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster are discussed. Also, inter and intra cluster communications are presented in detail. The security of the entire network through efficient key management by taking into consideration the network’s power capabilities is discussed. In this paper, we have discussed several existing methods for key revocation.
Keywords: Key distribution, Key revocation, heterogeneous atmosphere, wireless sensor node, Security Requirements, Sensor Network, clusters, nodes.