Combinatorial design of key distribution mechanisms for wireless sensor networks


Autoria(s): Camtepe, Seyit A.; Yener, Bulent
Data(s)

01/04/2007

Resumo

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/56823/

Publicador

Institute of Electrical and Electronics Engineers (IEEE)

Relação

http://eprints.qut.edu.au/56823/1/1J2007_Camtepe.pdf

DOI:10.1109/TNET.2007.892879

Camtepe, Seyit A. & Yener, Bulent (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), pp. 346-358.

Direitos

Copyright 2007 IEEE

- author can archive pre-print (ie pre-refereeing) - author can archive post-print (ie final draft post-refereeing) - author cannot archive publisher's version/PDF •Authors own and employers publicly accessible webpages •Preprint - Must be removed upon publication of final version and replaced with either full citation to IEEE work with a Digital Object Identifier or link to article abstract in IEEE Xplore or Authors post-print •Preprint - Set-phrase must be added once submitted to IEEE for publication ("This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible") •Preprint - Set phrase must be added when accepted by IEEE for publication ("(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.") •Preprint - IEEE must be informed as to the electronic address of the pre-print •Postprint - Publisher copyright and source must be acknowledged (see above set statement) •Publisher's version/PDF cannot be used •Publisher copyright and source must be acknowledged

Fonte

School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #010104 Combinatorics and Discrete Mathematics (excl. Physical Combinatorics) #080402 Data Encryption #100503 Computer Communications Networks #100510 Wireless Communications #Wireless sensor networks #Key distribution mechanism #Balanced incomplete block designs #Generalized quadrangles #Key-chains
Tipo

Journal Article