On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks

The constraints of lightweight distributed computing environments such as wireless sensor networks lend themselves to the use of symmetric cryptography to provide security services. The lack of central infrastructure after deployment of such networks requires the necessary symmetric keys to be predistributed to participating nodes. The rich mathematical structure of combinatorial designs has resulted in the proposal of several key predistribution schemes for wireless sensor networks based on designs. We review and examine the appropriateness of combinatorial designs as a tool for building key predistribution schemes suitable for such environments.

[1]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[2]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[3]  Sushmita Ruj,et al.  Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks , 2007, ISPA.

[4]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[5]  Douglas R. Stinson,et al.  Generalized cover-free families , 2004, Discret. Math..

[6]  Moti Yung,et al.  Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[7]  C. Colbourn,et al.  The CRC handbook of combinatorial designs , edited by Charles J. Colbourn and Jeffrey H. Dinitz. Pp. 784. $89.95. 1996. ISBN 0-8493-8948-8 (CRC). , 1997, The Mathematical Gazette.

[8]  Douglas R. Stinson,et al.  Key predistribution for homogeneous wireless sensor networks with group deployment of nodes , 2010, TOSN.

[9]  Subhamoy Maitra,et al.  A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design , 2005, International Journal of Information Security.

[10]  Martin E. Dyer,et al.  On key storage in secure networks , 1995, Journal of Cryptology.

[11]  Douglas R. Stinson,et al.  Common intersection designs , 2006 .

[12]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[15]  Chris J. Mitchell,et al.  The cost of reducing key-storage requirements in secure networks , 1987, Comput. Secur..

[16]  Javier López,et al.  Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..

[17]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[18]  Tuvi Etzion,et al.  Efficient Key Predistribution for Grid-Based Wireless Sensor Networks , 2008, ICITS.

[19]  Jiang Wu,et al.  Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.

[20]  Keith M. Martin,et al.  An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..

[21]  Keith M. Martin,et al.  Surveys in Combinatorics 2007: The combinatorics of cryptographic key establishment , 2007 .

[22]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[23]  Ian F. Blake,et al.  Reducing Communication Overhead of Key Distribution Schemes for Wireless Sensor Networks , 2007, 2007 16th International Conference on Computer Communications and Networks.

[24]  Harry Vereecken,et al.  SoilNet - A Zigbee based soil moisture sensor network , 2007 .

[25]  S. Guru,et al.  Wireless sensor network deployment for water use efficiency in irrigation , 2008, Real-World Wireless Sensor Networks.

[26]  Jennifer Seberry,et al.  Combinatorial Structures for Design of Wireless Sensor Networks , 2006, ACNS.

[27]  Douglas R. Stinson,et al.  On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption , 1997, Des. Codes Cryptogr..

[28]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[29]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[30]  Tuvi Etzion,et al.  Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks , 2008, IEEE Transactions on Information Theory.

[31]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.