On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks

Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise and revelation. Therefore, establishing secure communication in such networks is of great importance necessitating utilization of efficient key distribution schemes. In order to address such methods, several works using probabilistic, deterministic and hybrid approaches have been introduced in past few years. In this paper, we study the connectivity of key-distribution mechanisms in secured topologies of wireless sensor networks. We explore the effect of the radio range on the connectivity of the network and provide a lower bound on the radio range under which the cover time of the underlying topology decreases significantly. We also deduce that any broadcasting algorithm in such a network is performing only by a factor O(nβ), where β ∈ (0, 1), worse than broadcasting algorithms in unsecured topologies. Our numerical results and simulation experiments validates the correctness and efficiency of our analysis.

[1]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  Amnon Ta-Shma,et al.  A combinatorial construction of almost-ramanujan graphs using the zig-zag product , 2008, STOC.

[3]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[4]  Johannes Gehrke,et al.  Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[5]  Panganamala Ramana Kumar,et al.  Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach , 2006, Found. Trends Netw..

[6]  R. Srikant,et al.  Unreliable sensor grids: coverage, connectivity and diameter , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Ronghua Wang,et al.  Secure and efficient use of public key cryptography in sensor networks , 2007 .

[8]  M. Murty Ramanujan Graphs , 1965 .

[9]  S. Sitharama Iyengar,et al.  Optimized broadcast protocol for sensor networks , 2005, IEEE Transactions on Computers.

[10]  Ivan Stojmenovic,et al.  Performance Evaluation of Broadcasting Protocols for Ad Hoc and Sensor Networks , 2005, Med-Hoc-Net.

[11]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[12]  Ahmed Helmy,et al.  Active query forwarding in sensor networks , 2005, Ad Hoc Networks.

[13]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[14]  Prabhakar Raghavan,et al.  The electrical resistance of a graph captures its commute and cover times , 2005, computational complexity.

[15]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[16]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[17]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[18]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[19]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[20]  Chen Avin,et al.  On the Cover Time of Random Geometric Graphs , 2005, ICALP.

[21]  Ahmad Khonsari,et al.  A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[22]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[23]  Alan M. Frieze,et al.  The Cover Time of Random Regular Graphs , 2005, SIAM J. Discret. Math..

[24]  Thomas Sauerwald,et al.  Cover Time and Broadcast Time , 2009, STACS.