Venkata Krishna Rayi

The University of Memphis, Memphis, TN, United States

Are you Venkata Krishna Rayi?

Claim your profile

Publications (2)0 Total impact

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless sensor networks have many applications, vary in size, and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these networks. Sensor nodes used to form these networks are resource-constrained, which make security applications a challenging problem. Efficient key distribution and management mechanisms are needed besides lightweight ciphers. Many key establishment techniques have been designed to address the tradeoff between limited memory and security, but which scheme is the most effective is still debatable. In this paper, we provide a survey of key management schemes in wireless sensor networks. We notice that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.
    Computer Communications. 09/2007;
  • Venkata Krishna Rayi, Yang Xiao, Bo Sun, Xiaojiang James Du, Fei Hu
    [Show abstract] [Hide abstract]
    ABSTRACT: In the near future, sensor networks are going to be a part of everyday life. Traffic monitoring, military tracking, building safety, pollution monitoring, wildlife monitoring, patient security are some of the applications in sensor networks. Sensor networks vary in size and can consist of 10 to 1,000,000 sensor nodes. They can be deployed in a wide variety of areas, including hostile environments, demanding secure measures for data transfer. Sensor nodes used to form these networks are resource-constrained, which makes these types of security applications a challenging problem. A basic technique to protect data is encryption; but, due to resource constraints, achieving necessary key agreement for encryption is not easy. Many key establishment techniques have been designed to address this challenge, but which scheme is the most effective is still debatable. Our work aimed to generate a brief knowledge about different key management schemes and their effectiveness. We noticed that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements and resources of each individual sensor network.
    12/2006: pages 341-380;