Threshold Functions for Embedding Secure Paths into Random Key Pre-Distribution Based Wireless Sensor Networks

被引:0
|
作者
Li, Wei-Shuo [1 ]
Hsieh, Wen-Shyong [1 ,2 ]
Chen, Cheng-Yeh [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Informat Engn, Kaohsiung 80424, Taiwan
[2] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2010年 / 11卷 / 06期
关键词
Sensor networks; Security; Random key pre-distribution; Threshold; Szemeredi's regularity lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many random key pre-distribution based schemes have been developed to enhance security Most of these schemes need to guarantee the existence of specific properties, such as disjoint secure paths or disjoint secure cliques, to achieve a secure cooperation among nodes Which conditions ensure that large-scale sensor networks have a certain structure? The most well-known solutions of this kind of problems are probably Szemeredi's regularity lemma for embedding and perfect matching The Szemeredi's Embedding lemma allows one to embed a small graph H into an underlying graph, when a network is sufficiently large Perfect matching is generalized by perfect H-packing, which covers G by disjoint copies of a small graph H instead of covering all vertices of G with disjoint edges However, analyzing such a structure or combinatorial problem is complicated in classical wireless network models such as percolation theories or random geometric graphs Particularly, proof of results in geometric setting models often blend stochastic geometric and combinatorial techniques and is more technically challenging To overcome this problem, our objective is to use an approximate quasi-random graph in order to eliminate some properties that are difficult to handle In this work, we analyzes the question of the threshold probability function for the property that "every pair of vertices lies in a secure path" with respect to a security parameter p In other words, the goal is to obtain a threshold function p(0)(n), such that if given p << p(0)(n) then the probability that a security subgraph has above property is close to 1 and if p is slightly small then P-0, then this probability is close to 0 To be more precise, we first obtain a epsilon-regular partition of the sensor network by using the Szemeredi regularity lemma Then, cover each pair of nodes that is regular by a secure path P-l of length l Finally, a threshold can be obtained for almost pair of nodes (regularity nodes), and then one can match remaining irregular pairs using an appropriate control for those irregular nodes Nevertheless, the main difference is that in a random graph the dependence/disjointness of certain events comes naturally, whereas in an epsilon-regular graphs, one needs to work on it We show that in almost all security graphs the number of secure paths of length l is close to its expectation provided e is sufficiently small, p >> n((l 1)/l+o(1)) and n is sufficiently large
引用
收藏
页码:755 / 768
页数:14
相关论文
共 50 条
  • [1] Efficient ID-Based threshold random key pre-distribution scheme for wireless sensor networks
    Dai, Tran Thanh
    Hong, Choong Seon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (08) : 2602 - 2609
  • [2] An ID-based random key pre-distribution scheme for wireless sensor networks
    Dai, Tran Thanh
    Hong, Choong Seon
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 4, PROCEEDINGS, 2007, 4490 : 590 - +
  • [3] Threshold behavior of multi-path random key pre-distribution for sparse wireless sensor networks
    Li, Wei-Shuo
    Tsai, Chun-Wei
    Chen, Min
    Hsieh, Wen-Shyong
    Yang, Chu-Sing
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) : 2776 - 2787
  • [4] Replication attack on random key pre-distribution schemes for wireless sensor networks
    Fu, Huirong
    Kawamura, Satoshi
    Zhang, Ming
    Zhang, Liren
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 842 - 857
  • [5] Replication attack on random key pre-distribution schemes for wireless sensor networks
    Fu, HR
    Kawamura, S
    Zhang, M
    Zhang, LR
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 134 - 141
  • [6] Random Cooperative Key Pre-Distribution Scheme in Wireless Sensor Networks
    Zhao, Xiaojuan
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 52 - 63
  • [7] Grid-Based Key Pre-Distribution in Wireless Sensor Networks
    Mohaisen, Abedelaziz
    Nyang, DaeHun
    Maeng, YoungJae
    Lee, KyungHee
    Hong, Dowon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (02): : 195 - 208
  • [8] A new scheme of key pre-distribution based on public key for wireless sensor networks
    Yuan, Jia bin
    Ding, Xiang xiang
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 191 - 196
  • [9] A novel key pre-distribution scheme for wireless sensor networks
    Daneshjoo P.
    Javadi H.H.S.
    Hosseinzadeh M.
    Journal of Computational and Theoretical Nanoscience, 2016, 13 (01): : 1051 - 1054
  • [10] An efficient scheme for key pre-distribution in wireless sensor networks
    Boujelben, Manel
    Youssef, Habib
    Abid, Mohamed
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 532 - 537