Secure Overlay Routing for Large Scale Networks

被引:5
作者
Gharib, Mohammed [1 ]
Yousefi'zadeh, Homayoun [2 ]
Movaghar, Ali [3 ]
机构
[1] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
[2] Univ Calif Irvine, Ctr Pervas Commun & Comp, Irvine, CA 92697 USA
[3] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2019年 / 6卷 / 03期
关键词
Optimal secure routing; large scale networks; probabilistic key pre-distribution; Dijkstra algorithm; KEY DISTRIBUTION MECHANISMS; POLYNOMIAL-TIME ALGORITHM; PREDISTRIBUTION SCHEMES; COMBINATORIAL DESIGN; PRE-DISTRIBUTION; ESTABLISHMENT;
D O I
10.1109/TNSE.2018.2812830
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Probabilistic key pre-distribution schemes have recently emerged as major tools of addressing secure routing challenge in wireless networks. In our previous work, we propose an algorithm capable of finding optimal secure paths in overlay wireless networks. An important concern related to that algorithm is the scalability of the solution for large scale networks containing thousands of nodes. In this paper, we propose two alternative solutions for the previously formulated problem of secure overlay routing that can effectively scale to thousands of nodes. The first one is a deterministic Dijkstra-based algorithm analytically proven to find the optimal path with a time complexity much lower than that of the original algorithm. The second alternative is an approximation method capable of finding a near optimal path with an accuracy of 99 percent compared to the optimal path. At the cost of a space complexity in the order O(n log(3)n), this algorithm can find the near optimal path with a linear time complexity compared to quadratic or multiplicative time complexity associated with the first algorithm proposed in this paper. Experimental results using a number of different key pre-distribution schemes confirm our analytical findings.
引用
收藏
页码:501 / 511
页数:11
相关论文
共 36 条
[1]  
[Anonymous], 2008, ARXIV08101355
[2]  
[Anonymous], 2005, ACM T INFORM SYST SE, DOI DOI 10.1145/1053283.1053287
[3]  
[Anonymous], 1996, DYNAMIC SOURCE ROUTI
[4]  
[Anonymous], 2008, Monte Carlo Methods
[5]   A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks [J].
Bechkit, Walid ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid ;
Tarokh, Vahid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (02) :948-959
[6]  
Blom R., 1985, LNCS, V209, P335
[7]   A survey of mobility models for ad hoc network research [J].
Camp, T ;
Boleng, J ;
Davies, V .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05) :483-502
[8]  
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[9]   Combinatorial design of key distribution mechanisms for wireless sensor networks [J].
Camtepe, Seyit A. ;
Yener, Bulent .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (02) :346-358
[10]  
Çamtepe SA, 2006, IEEE ICC, P2262