Document Type: Original Research Paper


1 Department of Computer, Buinzahra Branch, Islamic Azad University, Buinzahra, Iran

2 Department of Mathematics and Applications, Shahed University, Tehran, Iran


A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conservation of communications, declaration, and key removal. The locations of nodes are not usually defined in the networks. When a secure connection is required they can be used by symmetrical or asymmetrical encodings. A node can just make secure connection, if they are in same radio range or have a common key. In dynamic wireless sensor networks compared with static networks the sensors are moveable and can be added or removed. This research makes an attempt to investigate the challenges of key management for encoding. It also tries to solve other remained problems in this field. Therefore, distribution and key management schemes supplying security and operational requirements of sensor networks are examined in fuzzy clustering and suitable protocol for key management.


Main Subjects

[1] M. Ge, K.-K. R. Choo, H. Wu, and Y. Yu, "Survey on key revocation mechanisms in wireless sensor networks," Journal of Network and Computer Applications, vol. 63, pp. 24-38, 2016.
[2] M. G. Ball, B. Qela, and S. Wesolkowski, "A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks," in Recent Advances in Computational Intelligence in Defense and Security, ed: Springer, 2016, pp. 663-693.
[3] H. Alemdar and C. Ersoy, Wireless sensor networks for healthcare: A survey. Computer Networks, vol 15, pp. 2688-2710, 2010.
[4] C.Chen and H. Chao, A survey of key distribution in wireless sensor networks, Security and Communication Networks, 2011.
[5] M. Xie et al., Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, vol 34, pp.1302–1325, 2011.
[6] M. Simplcio, P. Barreto, C. Margi, and T. Carvalho, "A survey on key management mecha nisms for distributed wireless sensor networks," Computer Networks, vol.54, no.15, pp.2591- 2612, 2010.
[7] N. Islam and M. Moyeen, "An Empirical Study on Key Management Schemes of Wireless Sensor Network," group, vol. 134, 2016.
[8] C. Chen and H. Chao, "A survey of key distribution in wireless sensor networks,"Security and Communication Networks, 2011.
[9] V. Shnayder, M. Hempstead, B.-r. Chen, G. W. Allen, and M. Welsh, "Simulating the power the 2nd international conference on Embedded networked sensor systems, pp.188­200, ACM, 2004.