Abstract
Secure key establishment in wireless sensor networks has been shown to be efficient. For sake of computation power, pre- distribution of symmetric keys is recommended. In such schemes, a set S of keys is used and each deployed node knows a subset of S. However, the capture of nodes can quickly lead to the corruption of a significant part of the network and solutions like multi-deployment have been proposed. In multi-deployment schemes, sets of nodes – using different key sets – are sequentially deployed that limits the impact of the capture of nodes. In this paper, we consider the problem of connectivity of single deployment in regards to the size of key sets. We show that connectivity guaranteed solutions lead to network vulnerability when nodes are captured. Then we evaluate network robustness of different schemes.
This work was partially supported by a grant from CPER Nord-Pas-de-Calais/FEDER TAC MOSAÏQUE, French National Research Agency RNRT SVP, and CNRS National platform RECAP.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security (CCS 2002), pp. 41–47 (2002)
Durresi, A., Bulusu, V., Paruchuri, V., Barolli, L.: Secure and continuous management of heterogeneous ad hoc networks. In: Proc. 20th International Conference on Advanced Information Networking and Applications - (AINA 2006), vol. 1, pp. 511–516. IEEE Computer Society Press, Los Alamitos (2006)
Michiardi, P., Molva, R.: Ad hoc network security. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, pp. 329–354. Wiley-IEEE Press (2004)
Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc networks. In: Proc of MobiHoc, pp. 226–236. ACM, New York (2002)
Hauspie, M., Simplot-Ryl, I.: Cooperation in ad hoc networks: Enhancing the virtual currency based models. In: Proc. of the 1st International Conference on Integrated Internet Ad hoc and Sensor Networks (InterSense 2006) (2006)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (2004)
Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (S&P 2003), pp. 197–213. IEEE Computer Society, Los Alamitos (2003)
Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale sensor networks. Ad Hoc Networks 3(5), 668–688 (2005)
Gallais, A., Carle, J., Simplot-Ryl, D., Stojmenovic, I.: Localized sensor area coverage with low communication overhead. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006) (2006)
Carle, J., Simplot-Ryl, D.: Energy efficient area monitoring by sensor networks. IEEE Computer 37(2), 40–46 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Simplot-Ryl, D., Simplot-Ryl, I. (2006). Connectivity Preservation and Key Distribution in Wireless Sensor Networks Using Multi-deployment Scheme. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_100
Download citation
DOI: https://doi.org/10.1007/11833529_100
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38091-7
Online ISBN: 978-3-540-38092-4
eBook Packages: Computer ScienceComputer Science (R0)Springer Nature Proceedings Computer Science
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

