Skip to main content

Connectivity Preservation and Key Distribution in Wireless Sensor Networks Using Multi-deployment Scheme

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

  • 994 Accesses

  • 1 Citation

Abstract

Secure key establishment in wireless sensor networks has been shown to be efficient. For sake of computation power, pre- distribution of symmetric keys is recommended. In such schemes, a set S of keys is used and each deployed node knows a subset of S. However, the capture of nodes can quickly lead to the corruption of a significant part of the network and solutions like multi-deployment have been proposed. In multi-deployment schemes, sets of nodes – using different key sets – are sequentially deployed that limits the impact of the capture of nodes. In this paper, we consider the problem of connectivity of single deployment in regards to the size of key sets. We show that connectivity guaranteed solutions lead to network vulnerability when nodes are captured. Then we evaluate network robustness of different schemes.

This work was partially supported by a grant from CPER Nord-Pas-de-Calais/FEDER TAC MOSAÏQUE, French National Research Agency RNRT SVP, and CNRS National platform RECAP.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security (CCS 2002), pp. 41–47 (2002)

    Google Scholar 

  3. Durresi, A., Bulusu, V., Paruchuri, V., Barolli, L.: Secure and continuous management of heterogeneous ad hoc networks. In: Proc. 20th International Conference on Advanced Information Networking and Applications - (AINA 2006), vol. 1, pp. 511–516. IEEE Computer Society Press, Los Alamitos (2006)

    Chapter  Google Scholar 

  4. Michiardi, P., Molva, R.: Ad hoc network security. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, pp. 329–354. Wiley-IEEE Press (2004)

    Google Scholar 

  5. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc networks. In: Proc of MobiHoc, pp. 226–236. ACM, New York (2002)

    Google Scholar 

  6. Hauspie, M., Simplot-Ryl, I.: Cooperation in ad hoc networks: Enhancing the virtual currency based models. In: Proc. of the 1st International Conference on Integrated Internet Ad hoc and Sensor Networks (InterSense 2006) (2006)

    Google Scholar 

  7. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (2004)

    Google Scholar 

  9. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (S&P 2003), pp. 197–213. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  10. Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale sensor networks. Ad Hoc Networks 3(5), 668–688 (2005)

    Article  Google Scholar 

  11. Gallais, A., Carle, J., Simplot-Ryl, D., Stojmenovic, I.: Localized sensor area coverage with low communication overhead. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006) (2006)

    Google Scholar 

  12. Carle, J., Simplot-Ryl, D.: Energy efficient area monitoring by sensor networks. IEEE Computer 37(2), 40–46 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Simplot-Ryl, D., Simplot-Ryl, I. (2006). Connectivity Preservation and Key Distribution in Wireless Sensor Networks Using Multi-deployment Scheme. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_100

Download citation

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics