Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments

Warning The system is temporarily closed to updates for reporting purpose.

Ünlü, Abdülhakim and Levi, Albert (2010) Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments. Mobile Networks and Applications (Sp. Iss. SI), 15 (4). pp. 517-529. ISSN 1383-469X (Print) 1572-8153 (Online)

This is the latest version of this item.

PDF (This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and post-print (ie final draft post-refereeing) ; author cannot archive publisher's version/PDF) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader

Official URL: http://dx.doi.org/10.1007/s11036-009-0188-z


We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost by using minimal flooding in key distribution. Moreover, we show that our scheme is scalable such that no extra overhead in incurred in case of increased number of nodes and sensor field size. Most importantly, simulation results show that our scheme is highly resilient to node captures.

Item Type:Article
Uncontrolled Keywords:security; authentication; key management; sensor networks; resiliency against node capture attacks
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication
Q Science > QA Mathematics > QA075 Electronic computers. Computer science
ID Code:14113
Deposited By:Albert Levi
Deposited On:05 Jul 2010 12:01
Last Modified:25 Jul 2019 11:05

Available Versions of this Item

Repository Staff Only: item control page