Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments

被引:0
|
作者
Abdülhakim Ünlü
Albert Levi
机构
[1] Sabancı University,Faculty of Engineering and Natural Sciences
来源
关键词
security; authentication; key management; sensor networks; resiliency against node capture attacks;
D O I
暂无
中图分类号
学科分类号
摘要
We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost by using minimal flooding in key distribution. Moreover, we show that our scheme is scalable such that no extra overhead in incurred in case of increased number of nodes and sensor field size. Most importantly, simulation results show that our scheme is highly resilient to node captures.
引用
收藏
页码:517 / 529
页数:12
相关论文
共 50 条
  • [41] Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network
    Kumar, Vipin
    Malik, Navneet
    Dhiman, Gaurav
    Lohani, Tarun Kumar
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [42] Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks
    Chen, Chin-Ling
    Lin, I-Hsien
    SENSORS, 2010, 10 (08) : 7347 - 7370
  • [43] LLR: A construction scheme of a low-diameter, location-aware, and resilient P2P network
    Sasabe, Masahiro
    Wakamiya, Naoki
    Murata, Masayuki
    2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 210 - +
  • [44] Can the polynomial based key predistribution scheme be used many times in one wireless sensor network key establishment protocol?
    Xu L.-Q.
    Chen H.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (18): : 376 - 384
  • [46] Optimal sink-node placement and routing for an energy efficient two-tier wireless sensor network
    Mathaba, Tebello N. D.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD), 2018,
  • [47] Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network
    Liao, Xiaojing
    Li, Jianzhong
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 335 - 341
  • [48] A Two-Tier Wireless Sensor Network Infrastructure for Large-Scale Real-Time Groundwater Monitoring
    Xue, Yuyan
    Ramamurthy, Byrav
    Burbach, Mark
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 874 - 881
  • [49] Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation
    Kagade, Ranjeet B.
    Jayagopalan, Santhosh
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2022, 32 (04)
  • [50] A two-layered deployment scheme for wireless sensor network based location tracking
    Kurschl, Werner
    Gottesheim, Wolfgang
    Mitsch, Stefan
    Prokop, Rene
    Schoenboeck, Johannes
    Beer, Wolfgang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 726 - +