Threshold Functions for Embedding Secure Paths into Random Key Pre-Distribution Based Wireless Sensor Networks

被引:0
|
作者
Li, Wei-Shuo [1 ]
Hsieh, Wen-Shyong [1 ,2 ]
Chen, Cheng-Yeh [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Informat Engn, Kaohsiung 80424, Taiwan
[2] Shu Te Univ, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2010年 / 11卷 / 06期
关键词
Sensor networks; Security; Random key pre-distribution; Threshold; Szemeredi's regularity lemma;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many random key pre-distribution based schemes have been developed to enhance security Most of these schemes need to guarantee the existence of specific properties, such as disjoint secure paths or disjoint secure cliques, to achieve a secure cooperation among nodes Which conditions ensure that large-scale sensor networks have a certain structure? The most well-known solutions of this kind of problems are probably Szemeredi's regularity lemma for embedding and perfect matching The Szemeredi's Embedding lemma allows one to embed a small graph H into an underlying graph, when a network is sufficiently large Perfect matching is generalized by perfect H-packing, which covers G by disjoint copies of a small graph H instead of covering all vertices of G with disjoint edges However, analyzing such a structure or combinatorial problem is complicated in classical wireless network models such as percolation theories or random geometric graphs Particularly, proof of results in geometric setting models often blend stochastic geometric and combinatorial techniques and is more technically challenging To overcome this problem, our objective is to use an approximate quasi-random graph in order to eliminate some properties that are difficult to handle In this work, we analyzes the question of the threshold probability function for the property that "every pair of vertices lies in a secure path" with respect to a security parameter p In other words, the goal is to obtain a threshold function p(0)(n), such that if given p << p(0)(n) then the probability that a security subgraph has above property is close to 1 and if p is slightly small then P-0, then this probability is close to 0 To be more precise, we first obtain a epsilon-regular partition of the sensor network by using the Szemeredi regularity lemma Then, cover each pair of nodes that is regular by a secure path P-l of length l Finally, a threshold can be obtained for almost pair of nodes (regularity nodes), and then one can match remaining irregular pairs using an appropriate control for those irregular nodes Nevertheless, the main difference is that in a random graph the dependence/disjointness of certain events comes naturally, whereas in an epsilon-regular graphs, one needs to work on it We show that in almost all security graphs the number of secure paths of length l is close to its expectation provided e is sufficiently small, p >> n((l 1)/l+o(1)) and n is sufficiently large
引用
收藏
页码:755 / 768
页数:14
相关论文
共 50 条
  • [41] On the inefficiency of the resources optimal key pre-distribution scheme for wireless sensor network
    Mohaisen A.
    Nyang D.
    Journal of Communications, 2010, 5 (02): : 164 - 168
  • [42] An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge
    Zhou, Boqing
    Li, Sujun
    Li, Qiaoliang
    Sun, Xingming
    Wang, Xiaoming
    COMPUTER COMMUNICATIONS, 2009, 32 (01) : 124 - 133
  • [43] A key management scheme based on random key distribution for clustered wireless sensor networks
    Kausar, Firdous
    Masood, Ashraf
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1395 - +
  • [44] Multi-Neighbor Random Key Pre-Distribution: A Probabilistic Analysis
    Li, Wei-Shou
    Su, Tung-Shih
    Hsieh, Wen-Shyong
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 306 - 308
  • [45] A hierarchical key pre-distribution scheme for fog networks
    Bahrami, Pooneh Nikkhah
    Javadi, Hamid H. S.
    Dargahi, Tooska
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22)
  • [46] Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology
    Antony, Siti Noor Farwina Mohamad Anwar
    Bahari, Muhammad Fatihin Afiq
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [47] A Novel Key Pre-distribution Scheme Using One-way Hash Chain and Bivariate Polynomial for Wireless Sensor Networks
    Xu, Li
    Shen, Jinbo
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 575 - +
  • [48] Stealthy pre-attacks against random key pre-distribution security
    Papadimitratos, Panagiotis
    Deng, Jing
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [49] Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN
    Wang, Hao
    Yang, Jian
    Wang, Ping
    Tu, Pu
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 : 291 - 304
  • [50] Secure Key Renewal and Revocation for Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    Delobel, Francois
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 382 - 385