Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments

Ünlü, Abdülhakim and Levi, Albert (2010) Two-tier, scalable and highly resilient key predistribution scheme for location-aware wireless sensor network deployments. Mobile Networks and Applications (Sp. Iss. SI), 15 (4). pp. 517-529. ISSN 1383-469X (Print) 1572-8153 (Online)

This is the latest version of this item.

[thumbnail of This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and post-print (ie final draft post-refereeing) ; author cannot archive publisher's version/PDF] PDF (This is a RoMEO green publisher -- author can archive pre-print (ie pre-refereeing) and post-print (ie final draft post-refereeing) ; author cannot archive publisher's version/PDF)
springerlink-propublication.pdf

Download (2MB)

Abstract

We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost by using minimal flooding in key distribution. Moreover, we show that our scheme is scalable such that no extra overhead in incurred in case of increased number of nodes and sensor field size. Most importantly, simulation results show that our scheme is highly resilient to node captures.
Item Type: Article
Uncontrolled Keywords: security; authentication; key management; sensor networks; resiliency against node capture attacks
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication
Q Science > QA Mathematics > QA075 Electronic computers. Computer science
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Albert Levi
Date Deposited: 05 Jul 2010 12:01
Last Modified: 26 Apr 2022 08:38
URI: https://research.sabanciuniv.edu/id/eprint/14113

Available Versions of this Item

Actions (login required)

View Item
View Item