Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links

被引:0
|
作者
Zhao, Jun [1 ,2 ]
Yagan, Osman [1 ,2 ]
Gligor, Virgil [1 ,2 ]
机构
[1] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Dept ECE, Pittsburgh, PA 15213 USA
来源
2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT) | 2015年
关键词
Connectivity; key predistribution; minimum degree; random graphs; security; wireless sensor networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Eschenauer-Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of k-connectivity in WSNs employing the EG scheme with unreliable links represented by independent on/off channels, where k-connectivity ensures that the network remains connected despite the failure of any (k-1) sensors or links. Our analytical results are confirmed via numerical experiments, and they provide precise guidelines for the design of secure WSNs that exhibit a desired level of reliability against node and link failures.
引用
收藏
页码:191 / 198
页数:8
相关论文
共 50 条
  • [41] Connectivity and Transmission Delay in Large-Scale Cognitive Radio Ad Hoc Networks With Unreliable Secondary Links
    Liu, Yushan
    Cui, Ying
    Wang, Xinbing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (12) : 7016 - 7029
  • [42] Exact Top-K Queries in Wireless Sensor Networks
    Malhotra, Baljeet
    Nascimento, Mario A.
    Nikolaidis, Ioanis
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (10) : 1513 - 1525
  • [43] A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks
    Srinivasan, Avinash
    Wu, Jie
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1497 - 1502
  • [44] Secure Data Aggregation based on Interval Analysis for Wireless Sensor Networks
    Lu, Yafang
    Feng, Xu
    Yi, Kefu
    Wan, Jiangwen
    2014 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL 2, 2014, : 305 - 308
  • [45] D2ER: Distributed Energy Efficient Routing in Wireless Sensor Networks with Unreliable Links
    Lu, Dianjie
    Zheng, Xiangwei
    Zhang, Guijuan
    Hong, Jue
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 613 - 616
  • [46] Analysis of k-Coverage in Wireless Sensor Networks
    Patra, Rasmi Ranjan
    Patra, Prashanta Kumar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (09) : 91 - 96
  • [47] Secure Top-k Query Scheme in Wireless Sensor Networks
    Xiao, Yunpeng
    Zhang, Yaru
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 516 - 519
  • [48] Analysis of connectivity for sensor networks using geometrical probability
    Jia, WJ
    Fu, YJ
    Wang, WX
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 601 - 611
  • [49] Complete k-Line Coverage and Connectivity in Wireless Sensor Networks
    Prakash, Sai S. K. L., V
    Seema, Guru Bharath
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 226 - 232
  • [50] Secure Top-k Query Processing in Unattended Tiered Sensor Networks
    Zhang, Rui
    Shi, Jing
    Zhang, Yanchao
    Huang, Xiaoxia
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4681 - 4693