Authors: Dieynaba Mall; Karim Konaté; Al-Sakib Khan Pathan
Addresses: Department of Mathematics and Computer Science, Université Cheikh Anta Diop de Dakar, BP 5005 Dakar, Senegal ' Department of Mathematics and Computer Science, Université Cheikh Anta Diop de Dakar, BP 5005 Dakar, Senegal ' Department of Computer Science, International Islamic University Malaysia, Gombak 53100, Kuala Lumpur, Malaysia
Abstract: Key management in wireless sensor network (WSN) includes two important aspects namely key distribution, which constitutes the task of distributing secret keys to nodes in the network, and key revocation, which refers to the task of securely withdrawing the key information relating to any compromised node or because of tactical reasons. While in the existing literature, key distribution has been extensively studied, key revocation has received relatively little attention. A vital security issue like this needs proper recognition to be considered as a critical research area, not just as a partial segment of key management. With this motivation, in this paper, we present our rationale behind recognising the area and analyse the state-of-the-art key revocation techniques. Alongside our survey on the prominent schemes, we also present an analysis of security and performance that highlights the advantages and disadvantages of each scheme that explicitly mentions the method of key revocation.
Keywords: key revocation; key management; network security; wireless sensor networks; WSNs; key management.
International Journal of Ad Hoc and Ubiquitous Computing, 2015 Vol.18 No.1/2, pp.3 - 22
Available online: 23 Feb 2015Full-text access for editors Access for subscribers Purchase this article Comment on this article