On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs

被引:73
作者
Lee, Jooyoung [1 ]
Stinson, Douglas R. [2 ]
机构
[1] Natl Secur Res Inst, Taejon 305350, South Korea
[2] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
关键词
wireless sensor networks; key predistribution; security;
D O I
10.1145/1330332.1330333
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we discuss the use of combinatorial set systems ( combinatorial designs) in the design of key predistribution schemes ( KPSs) for sensor networks. We show that the performance of a KPS can be improved by carefully choosing a certain class of set systems as "key ring spaces". Especially, we analyze KPSs based on a type of combinatorial design known as a transversal design. We employ two types of transversal designs, which are represented by the set of all linear polynomials and the set of quadratic polynomials ( over some finite field), respectively. These KPSs turn out to have significant efficiency in a shared- key discovery phase without degrading connectivity and resiliency.
引用
收藏
页数:35
相关论文
共 20 条
[1]  
[Anonymous], 2007, CRC HDB COMBINATORIA
[2]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[3]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[4]  
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[5]   Combinatorial design of key distribution mechanisms for wireless sensor networks [J].
Camtepe, Seyit A. ;
Yener, Bulent .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (02) :346-358
[6]  
Carmen D.W, 2000, 00010 NAI LABS
[7]  
Chakrabarti D, 2005, LECT NOTES COMPUT SC, V3650, P89
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]