Next Article in Journal
Selenocystine Modified Screen-Printed Carbon Electrode as an Alternative Sensor for the Voltammetric Determination of Metal Ions
Previous Article in Journal
Effect of Automatic Gain Control on Non-Contact Capacitive Measurement of Respiratory Movements during Sleep
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Abstract

Cryptographic Protocols in Wireless Sensor Networks: A Critical Review †

by
Angel Martin del Rey
* and
Araceli Queiruga Dios
Department of Applied Mathematics, University of Salamanca, 37008 Salamanca, Spain
*
Author to whom correspondence should be addressed.
Presented at the 5th International Symposium on Sensor Science (I3S 2017), Barcelona, Spain, 27–29 September 2017.
Proceedings 2017, 1(8), 748; https://doi.org/10.3390/proceedings1080748
Published: 29 November 2017
Wireless sensor networks (WSNs) play a fundamental role in new paradigms such as the Internet of Everything or the Industry 4.0. Usually, these networks are constituted by hundreds or thousands of sensor nodes with limited resource capabilities whose main goal is to monitor, collect, compute and communicate data from the environment in an efficient and distributed way.
WSNs are widely used in several different fields such as environmental management and research, e-health, military and risk management, etc. In many of these applications, the security of the network is a fundamental issue. Consequently, it is crucial to guarantee the confidentiality, integrity, authenticity and availability of the data transmitted through the WSN.
Most of the cryptographic protocols implemented in WSNs for key establishment and data encryption (secret-key cryptosystems and public-key cryptosystems) are adaptations of those used in other types of environments without the limited resources and capabilities of WSNs.
The main goal of this work is to perform a critical review of such cryptographic protocols, focusing the attention on secret-key cryptosystems since this type of protocol requires less processing time than public-key algorithms. The problems, solutions and challenges dealing with this topic will be identified and explicitly shown.

Share and Cite

MDPI and ACS Style

Rey, A.M.d.; Dios, A.Q. Cryptographic Protocols in Wireless Sensor Networks: A Critical Review. Proceedings 2017, 1, 748. https://doi.org/10.3390/proceedings1080748

AMA Style

Rey AMd, Dios AQ. Cryptographic Protocols in Wireless Sensor Networks: A Critical Review. Proceedings. 2017; 1(8):748. https://doi.org/10.3390/proceedings1080748

Chicago/Turabian Style

Rey, Angel Martin del, and Araceli Queiruga Dios. 2017. "Cryptographic Protocols in Wireless Sensor Networks: A Critical Review" Proceedings 1, no. 8: 748. https://doi.org/10.3390/proceedings1080748

APA Style

Rey, A. M. d., & Dios, A. Q. (2017). Cryptographic Protocols in Wireless Sensor Networks: A Critical Review. Proceedings, 1(8), 748. https://doi.org/10.3390/proceedings1080748

Article Metrics

Back to TopTop