Exact Formulae for Resilience in Random Key Predistribution Schemes

被引:23
作者
Yum, Dae Hyun [1 ]
Lee, Pil Joong [1 ,2 ]
机构
[1] POSTECH, Dept Elect Engn, Pohang 790784, Gyungbuk, South Korea
[2] POSTECH, Dept Creat IT Excellence Engn, Pohang 790784, Gyungbuk, South Korea
关键词
Wireless sensor network; security; key management; random key predistribution; resilience; WIRELESS SENSOR NETWORKS;
D O I
10.1109/TWC.2012.031212.110887
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As wireless sensor networks are often deployed in adverse or hostile environments, key management schemes are required for sensor nodes. The random key predistribution (RKP) scheme is a probabilistic key management scheme where each node is preloaded with a subset of keys that are randomly selected from a pool of keys. If a pair of neighbor nodes have a common key, it can be used to establish a secure link between the nodes. The q-composite RKP scheme requires that a pair of neighbor nodes have at least q common keys for a secure link. In this article, we show that the previous security analysis (i.e., resilience against node capture) of the q-composite RKP scheme is inaccurate and present new formulae for resilience in the RKP scheme and the q-composite RKP scheme.
引用
收藏
页码:1638 / 1642
页数:5
相关论文
共 9 条
[1]  
[Anonymous], P 2003 IEEE S SEC PR
[2]  
[Anonymous], 2001, ALGORITHMS COMBIN
[3]   On the false-positive rate of Bloom filters [J].
Bose, Prosenjit ;
Guo, Hua ;
Kranakis, Evangelos ;
Maheshwari, Anil ;
Morin, Pat ;
Morrison, Jason ;
Smid, Michiel ;
Tang, Yihui .
INFORMATION PROCESSING LETTERS, 2008, 108 (04) :210-213
[4]   A new analysis of the false positive rate of a Bloom filter [J].
Christensen, Ken ;
Roginsky, Allen ;
Jimeno, Miguel .
INFORMATION PROCESSING LETTERS, 2010, 110 (21) :944-949
[5]  
Eschenauer L., P 2002 ACM C COMP CO, P41
[6]   A survey on key management mechanisms for distributed Wireless Sensor Networks [J].
Simplicio, Marcos A., Jr. ;
Barreto, Paulo S. L. M. ;
Margi, Cintia B. ;
Carvalho, Tereza C. M. B. .
COMPUTER NETWORKS, 2010, 54 (15) :2591-2612
[7]   A survey of key management schemes in wireless sensor networks [J].
Xiao, Yang ;
Rayi, Venkata Krishna ;
Sun, Bo ;
Du, Xiaojiang ;
Hu, Fei ;
Galloway, Michael .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2314-2341
[8]   SECURING WIRELESS SENSOR NETWORKS: A SURVEY [J].
Zhou, Yun ;
Fang, Yuguang ;
Zhang, Yanchao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (03) :6-28
[9]  
Zhu S., P 2003 IEEE INT C NE, P326