Random key predistribution for wireless sensor networks using deployment knowledge

We consider a key distribution scheme for wireless sensor networks which uses deployment knowledge. Deployment is modeled as a grid of hexagonal clusters, into centers of which the sensor nodes are dropped according to a given probability distribution (e.g. a Gaussian one). We consider sensor connectivity in a random intersection graph model, instead of the more commonly used in literature G(n, p) graph model. While the latter is easier to analyze, the former is much more suitable to modeling sensor network key distribution. We provide analytical, asymptotic results showing how to pick parameters (key pool size |S|, the number of chosen keys d) depending on the number of deployed nodes in order to assure global connectivity of the network, and estimate the diameter of the network for the given parameters.

[1]  Mindaugas Bloznelis Degree distribution of a typical vertex in a general random intersection graph , 2008 .

[2]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[3]  Yong Guan,et al.  A key pre-distribution scheme using deployment knowledge for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[4]  Yuguang Fang,et al.  LLK: a link-layer key establishment scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  Jingsha He,et al.  A hexagon-based key predistribution scheme in sensor networks , 2006, 2006 International Conference on Parallel Processing Workshops (ICPPW'06).

[6]  Mindaugas Bloznelis,et al.  Component evolution in a secure wireless sensor network , 2009 .

[7]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[8]  Svante Janson,et al.  Random graphs , 2000, ZOR Methods Model. Oper. Res..

[9]  T Beth,et al.  Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques , 1985 .

[10]  Andreas N. Lagerås,et al.  Epidemics on Random Graphs with Tunable Clustering , 2007, Journal of Applied Probability.

[11]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[12]  Stefanie Gerke,et al.  Connectivity of the uniform random intersection graph , 2008, Discret. Math..

[13]  Mindaugas Bloznelis,et al.  Component evolution in a secure wireless sensor network , 2009, Networks.

[14]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[17]  Nicolas W. Hengartner,et al.  Component Evolution in General Random Intersection Graphs , 2010, WAW.

[18]  Yuguang Fang,et al.  Key establishment in sensor networks based on triangle grid deployment model , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[19]  Willemien Kets,et al.  RANDOM INTERSECTION GRAPHS WITH TUNABLE DEGREE DISTRIBUTION AND CLUSTERING , 2009, Probability in the Engineering and Informational Sciences.

[20]  Jingsha He,et al.  Key Predistribution in Sensor Networks , 2006, UIC.

[21]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[22]  L. Mancini,et al.  How to Design Connected Sensor Networks that Are Provably Secure , 2006 .