Location-Independent Key Distribution for Sensor Network Using Regular Graph

Regular graph is the type of graph whose degree of all vertices are same, and this property makes it very useful in design of key distribution algorithm. Keys in wireless sensor node need to be evenly distributed for efficient storage and good connectivity. In the past various methods have been proposed to overcome the problem of key predistribution for wireless sensor network. Among these, the balanced incomplete block design technique from the theory of combinatorics provides a meaningful enhancement in key predistribution. Also various improvements have been done over this technique for especial arrangement of sensor network. Here, we use Paley graph a class of regular graph to model our key distribution in a location-independent sensor environment, where locations of sensor nodes are assumed to be unknown prior to deployment or key distribution. Experiments were performed and presented here.

[1]  Monjul Saikia,et al.  Performance Analysis of Expander Graph Based Key Predistribution Scheme in WSN , 2016 .

[2]  Keith M. Martin,et al.  Graph-theoretic design and analysis of key predistribution schemes , 2016, Des. Codes Cryptogr..

[3]  Keith M. Martin,et al.  An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..

[4]  R. D. Baker,et al.  Maximal cliques in the Paley graph of square order , 1996 .

[5]  Marek Klonowski,et al.  Enhancing privacy for ad hoc systems with predeployment key distribution , 2017, Ad Hoc Networks.

[6]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  R. C. Bose Strongly regular graphs, partial geometries and partially balanced designs. , 1963 .

[8]  Subhamoy Maitra,et al.  A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks , 2005, ICISS.

[9]  Jun Zhao Analyzing Connectivity of Heterogeneous Secure Sensor Networks , 2018, IEEE Transactions on Control of Network Systems.

[10]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[11]  R. Paley On Orthogonal Matrices , 1933 .

[12]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[13]  N. J. A. Sloane,et al.  The On-Line Encyclopedia of Integer Sequences , 2003, Electron. J. Comb..

[14]  Zhi-Ren Qiu,et al.  A Rapid and Efficient Pre-deployment Key Scheme for Secure Data Transmissions in Sensor Networks Using Lagrange Interpolation Polynomial , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[15]  Gordon F. Royle,et al.  Algebraic Graph Theory , 2001, Graduate texts in mathematics.

[16]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..