Threshold Functions for Embedding Secure Paths into Random Key Pre-Distribution Based Wireless Sensor Networks

被引:0
|
作者
Li, Wei-Shuo [1 ]
Hsieh, Wen-Shyong [1 ,2 ]
Chen, Cheng-Yeh [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Informat Engn, Kaohsiung 80424, Taiwan
[2] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2010年 / 11卷 / 06期
关键词
Sensor networks; Security; Random key pre-distribution; Threshold; Szemeredi's regularity lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many random key pre-distribution based schemes have been developed to enhance security Most of these schemes need to guarantee the existence of specific properties, such as disjoint secure paths or disjoint secure cliques, to achieve a secure cooperation among nodes Which conditions ensure that large-scale sensor networks have a certain structure? The most well-known solutions of this kind of problems are probably Szemeredi's regularity lemma for embedding and perfect matching The Szemeredi's Embedding lemma allows one to embed a small graph H into an underlying graph, when a network is sufficiently large Perfect matching is generalized by perfect H-packing, which covers G by disjoint copies of a small graph H instead of covering all vertices of G with disjoint edges However, analyzing such a structure or combinatorial problem is complicated in classical wireless network models such as percolation theories or random geometric graphs Particularly, proof of results in geometric setting models often blend stochastic geometric and combinatorial techniques and is more technically challenging To overcome this problem, our objective is to use an approximate quasi-random graph in order to eliminate some properties that are difficult to handle In this work, we analyzes the question of the threshold probability function for the property that "every pair of vertices lies in a secure path" with respect to a security parameter p In other words, the goal is to obtain a threshold function p(0)(n), such that if given p << p(0)(n) then the probability that a security subgraph has above property is close to 1 and if p is slightly small then P-0, then this probability is close to 0 To be more precise, we first obtain a epsilon-regular partition of the sensor network by using the Szemeredi regularity lemma Then, cover each pair of nodes that is regular by a secure path P-l of length l Finally, a threshold can be obtained for almost pair of nodes (regularity nodes), and then one can match remaining irregular pairs using an appropriate control for those irregular nodes Nevertheless, the main difference is that in a random graph the dependence/disjointness of certain events comes naturally, whereas in an epsilon-regular graphs, one needs to work on it We show that in almost all security graphs the number of secure paths of length l is close to its expectation provided e is sufficiently small, p >> n((l 1)/l+o(1)) and n is sufficiently large
引用
收藏
页码:755 / 768
页数:14
相关论文
共 50 条
  • [31] A scalable key pre-distribution mechanism for large-scale wireless sensor networks
    Shen, An-Ni
    Guo, Song
    Chien, Hung Yu
    Guo, Minyi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2009, 21 (10) : 1373 - 1387
  • [32] TKP : Three Level Key Pre-distribution with Mobile Sinks for Wireless Sensor Networks
    Tanuja, R.
    Arudi, Souparnika P.
    Manjula, S. H.
    Venugopal, K. R.
    Patnaik, L. M.
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2015,
  • [33] A partial key pre-distribution based en-route filtering scheme for wireless sensor networks
    Kumar, Alok
    Bansal, Neha
    Pais, Alwyn Roshan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 1471 - 1486
  • [34] Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution
    Lin, Chih-Hsueh
    Huang, Yu-Hsiu
    Yein, Alan Dahgwo
    Hsieh, Wen-Shyong
    Lee, Chung-Nan
    Kuo, Pin-Chun
    ADVANCES IN MECHANICAL ENGINEERING, 2016, 8 (04) : 1 - 9
  • [35] A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks
    Yinghong Liu
    Yuanming Wu
    Wireless Personal Communications, 2019, 109 : 1161 - 1180
  • [36] A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks
    Liu, Yinghong
    Wu, Yuanming
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (02) : 1161 - 1180
  • [37] An Encryption Scheme Based on Key Pre-distribution for Wireless Sensor Network in Electromechanical System
    Yang Shao-Chun
    Zhang Guo-Qing
    Wang Peng
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 405 - +
  • [38] A survey of key pre-distribution and overlay routing in unstructured wireless networks
    Gharib, M.
    Yousefi'Zadeh, H.
    Movaghar, A.
    SCIENTIA IRANICA, 2016, 23 (06) : 2831 - 2844
  • [39] Improved handover authentication and key pre-distribution for wireless mesh networks
    Yang, Xu
    Huang, Xinyi
    Han, Jinguang
    Su, Chunhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10) : 2978 - 2990
  • [40] On grid-based key pre-distribution: Toward a better connectivity in wireless sensor network
    Mohaisen, Abedelaziz
    Maeng, YoungJae
    Nyang, DaeHun
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 527 - 537