Exploring Cryptographic Key Management Schemes for Enhanced Security in WSNs
Data publikacji: 28 lut 2025
Zakres stron: 18 - 37
DOI: https://doi.org/10.2478/ias-2025-0002
Słowa kluczowe
© 2025 Khushboo Jain, published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Securing wireless sensor networks (WSNs) is challenging due to the resource constraints of SNs, including limited computational power, memory, and energy capacity. Cryptographic key management is central to ensuring data confidentiality, integrity, and authenticity in WSNs. This paper explores key management schemes categorized by their design principles, including symmetric, asymmetric, hybrid, and hierarchical approaches. The strengths, limitations, and ideal use cases of these schemes are analyzed to identify their suitability for various applications. The study also addresses critical challenges such as energy efficiency, scalability, resilience to node capture, and the emerging need for post-quantum cryptography in securing future networks. The findings aim to guide the development of optimized key management solutions tailored to the evolving requirements of WSNs, ensuring robust security and operational efficiency.