TY - JOUR
T1 - Secure key design approaches using entropy harvesting in wireless sensor network
T2 - A survey
AU - Ghosal, Amrita
AU - Halder, Subir
AU - Chessa, Stefano
N1 - Publisher Copyright:
© 2016 Elsevier Ltd
PY - 2017/1/15
Y1 - 2017/1/15
N2 - Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area.
AB - Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area.
KW - Channel impulse response
KW - Information entropy
KW - Randomness extraction
KW - Received signal strength
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=85002674051&partnerID=8YFLogxK
U2 - 10.1016/j.jnca.2016.11.019
DO - 10.1016/j.jnca.2016.11.019
M3 - Review article
AN - SCOPUS:85002674051
SN - 1084-8045
VL - 78
SP - 216
EP - 230
JO - Journal of Network and Computer Applications
JF - Journal of Network and Computer Applications
ER -