An integer programming formulation of the key management problem in wireless sensor networks

With the advent of modern communications systems, much attention has been put on developing methods for securely transferring information between constituents of wireless sensor networks. To this effect, we introduce a mathematical programming formulation for the key management problem, which broadly serves as a mechanism for encrypting communications. In particular, an integer programming model of the q -Composite scheme is proposed and utilized to distribute keys among nodes of a network whose topology is known. Numerical experiments demonstrating the effectiveness of the proposed model are conducted using using a well-known optimization solver package. An illustrative example depicting an optimal encryption for a small-scale network is also presented.

[1]  Marc Sevaux,et al.  Column generation algorithm for sensor coverage scheduling under bandwidth constraints , 2012, Networks.

[2]  Sukun Kim,et al.  Health Monitoring of Civil Infrastructures Using Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[3]  My T. Thai,et al.  On approximation of dominating tree in wireless sensor networks , 2010, Optim. Lett..

[4]  Yash P. Aneja,et al.  A Branch-and-Cut Approach for the Minimum-Energy Broadcasting Problem in Wireless Networks , 2012, INFORMS J. Comput..

[5]  Panos M. Pardalos,et al.  Wireless networking, dominating and packing , 2010, Optim. Lett..

[6]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[7]  André Rossi,et al.  Lifetime maximization in wireless directional sensor network , 2013, Eur. J. Oper. Res..

[8]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[9]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[10]  James Demmel,et al.  Health Monitoring of Civil Infrastructures Using Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[11]  Alfredo García,et al.  A Game-Theoretic Approach to Efficient Power Management in Sensor Networks , 2008, Oper. Res..

[12]  Han-Chieh Chao,et al.  A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.

[13]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008 .

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  André Rossi,et al.  An exact approach for maximizing the lifetime of sensor networks with adjustable sensing ranges , 2012, Comput. Oper. Res..

[16]  Gang Zhou,et al.  Achieving Real-Time Target Tracking UsingWireless Sensor Networks , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).

[17]  Marco Carvalho,et al.  Topology design for on-demand dual-path routing in wireless networks , 2013, Optim. Lett..

[18]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[19]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[20]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[21]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.