Analyzing Connectivity of Heterogeneous Secure Sensor Networks

被引:2
|
作者
Zhao, Jun [1 ,2 ,3 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
[2] Princeton Univ, Princeton, NJ 07450 USA
[3] Carnegie Mellon Univ, Cybersecur Lab CyLab, Pittsburgh, PA 15213 USA
来源
关键词
Connectivity; heterogeneity; key predistribution; secure sensor networks; RANDOM INTERSECTION GRAPHS; KEY MANAGEMENT SCHEME;
D O I
10.1109/TCNS.2016.2641799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the connectivity of a heterogeneous secure sensor network that uses key predistribution to protect communications between sensors. For this network on a set nu(n) of n sensors, suppose there is a pool P-n consisting of P-n distinct keys. The n sensors in Vn are divided into m groups A(1), A(2),..., A(m). Each sensor v is independently assigned to exactly a group according to the probability distribution with P[v is an element of A(i)] = a(i) for i = 1, 2,..., m, where Sigma(m)(i=1) a(i) = 1. Afterwards, each sensor in group A(i) independently chooses K-i,K-n keys uniformly at random from the key pool P-n, where K-1,K-n <= K-2,K-n <=... <= K-m,K-n. Finally, any two sensors in nu(n) establish a secure link in between if and only if they have at least one key in common. We present critical conditions for connectivity of this heterogeneous secure sensor network. The result provides useful guidelines for the design of secure sensor networks. This paper improves the seminal work [1] (IEEE Transactions on Information Theory 2016) of Ya. gan on connectivity in the following aspects. First, our result is more broadly applicable; specifically, we consider Km, n/ K1, n = o(root n), while [1] requires K-m,K-n/K-1,K-n = o(ln n). Put differently, K-m,K-n/K-1,K-n in our paper examines the case of circle dot(n(x)) for any x < 1/2 and circle dot (ln n)(y)) for any y > 0, while that of [1] does not cover any T(nx), and covers any circle dot (ln n)(y)) for only 0 < y < 1. This improvement is possible due to a delicate coupling argument. Second, although both studies show that a critical scaling for connectivity is that the term b(n) denoting Sigma(m)(j=1) {a(j) [1- (K-j,n(Pn-K1,n))/((Pn)(Kj,n))]} equals ln n/n our paper considers any of b(n) = o(ln n/n), b(n) = circle dot (ln n/n) and b(n) = omega(ln n/n), while [1] evaluates only b(n) = circle dot(ln n/n). Third, in terms of characterizing the transitional behavior of connectivity, our scaling b(n) = ln n+ beta n/n for a sequence beta n is more fine-grained than the scaling b(n) similar to cln n/n for a constant c not equal 1 of [1]. In a nutshell, we add the case of c = 1 in b(n) similar to c ln n/n, where the graph can be connected or disconnected asymptotically, depending on the limit of beta(n). Finally, although a recent study by Eletreby and Ya. gan [2] uses the fine-grained scaling discussed before for a more complex graph model, their result (just like [1]) also demandsK(m,n)/K-1,K-n = o(ln n), which is less general than K-m,K-n/K-1,K-n = o(root n) addressed in this paper.
引用
收藏
页码:618 / 628
页数:11
相关论文
共 50 条
  • [21] VARIANCE AWARE SECURE ROUTING FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
    Kumar, Kamal
    Verma, A. K.
    Patel, R. B.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2013, 26 (02) : 159 - 169
  • [22] Preserving Relay Connectivity and Coverage in Heterogeneous Wireless Sensor Networks
    Wen, Jun
    Jiang, Jie
    Wu, Guofu
    Ban, Dongsong
    Dou, Wenhua
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 16 - 23
  • [23] Topology Control for Guaranteed Connectivity Provisioning in Heterogeneous Sensor Networks
    Li, Xiaolong
    Cai, Jun
    Zhang, Hong
    IEEE SENSORS JOURNAL, 2016, 16 (12) : 5060 - 5071
  • [24] Secure Localization algorithm based on distance and connectivity rule for sensor networks
    Communication Technology Research Institute, Harbin Institute of Technology, Harbin 150001, China
    Harbin Gongye Daxue Xuebao, 2008, SUPPL. (76-79):
  • [25] Optimal key management for secure and survivable heterogeneous wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Zhu, Hua
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 996 - +
  • [26] Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
    Azarderskhsh, Reza
    Reyhani-Masoleh, Arash
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [27] A Secure Online Key Establishment Scheme for Mobile Heterogeneous Sensor Networks
    Khan, Sarmad Ullah
    Pastrone, Claudio
    Lavagno, Luciano
    Spirito, Maurizio A.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [28] KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
    Shaila, K.
    Vineet, G. H.
    Prashanth, C. R.
    Tejaswi, V.
    Venugopal, K. R.
    Patnaik, L. M.
    ICEIS 2011: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 4, 2011, : 13 - 22
  • [29] Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
    Reza Azarderskhsh
    Arash Reyhani-Masoleh
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [30] Dynamic and secure key management model for hierarchical heterogeneous sensor networks
    Alagheband, M. R.
    Aref, M. R.
    IET INFORMATION SECURITY, 2012, 6 (04) : 271 - 280