Analyzing Connectivity of Heterogeneous Secure Sensor Networks

被引:2
|
作者
Zhao, Jun [1 ,2 ,3 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
[2] Princeton Univ, Princeton, NJ 07450 USA
[3] Carnegie Mellon Univ, Cybersecur Lab CyLab, Pittsburgh, PA 15213 USA
来源
关键词
Connectivity; heterogeneity; key predistribution; secure sensor networks; RANDOM INTERSECTION GRAPHS; KEY MANAGEMENT SCHEME;
D O I
10.1109/TCNS.2016.2641799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the connectivity of a heterogeneous secure sensor network that uses key predistribution to protect communications between sensors. For this network on a set nu(n) of n sensors, suppose there is a pool P-n consisting of P-n distinct keys. The n sensors in Vn are divided into m groups A(1), A(2),..., A(m). Each sensor v is independently assigned to exactly a group according to the probability distribution with P[v is an element of A(i)] = a(i) for i = 1, 2,..., m, where Sigma(m)(i=1) a(i) = 1. Afterwards, each sensor in group A(i) independently chooses K-i,K-n keys uniformly at random from the key pool P-n, where K-1,K-n <= K-2,K-n <=... <= K-m,K-n. Finally, any two sensors in nu(n) establish a secure link in between if and only if they have at least one key in common. We present critical conditions for connectivity of this heterogeneous secure sensor network. The result provides useful guidelines for the design of secure sensor networks. This paper improves the seminal work [1] (IEEE Transactions on Information Theory 2016) of Ya. gan on connectivity in the following aspects. First, our result is more broadly applicable; specifically, we consider Km, n/ K1, n = o(root n), while [1] requires K-m,K-n/K-1,K-n = o(ln n). Put differently, K-m,K-n/K-1,K-n in our paper examines the case of circle dot(n(x)) for any x < 1/2 and circle dot (ln n)(y)) for any y > 0, while that of [1] does not cover any T(nx), and covers any circle dot (ln n)(y)) for only 0 < y < 1. This improvement is possible due to a delicate coupling argument. Second, although both studies show that a critical scaling for connectivity is that the term b(n) denoting Sigma(m)(j=1) {a(j) [1- (K-j,n(Pn-K1,n))/((Pn)(Kj,n))]} equals ln n/n our paper considers any of b(n) = o(ln n/n), b(n) = circle dot (ln n/n) and b(n) = omega(ln n/n), while [1] evaluates only b(n) = circle dot(ln n/n). Third, in terms of characterizing the transitional behavior of connectivity, our scaling b(n) = ln n+ beta n/n for a sequence beta n is more fine-grained than the scaling b(n) similar to cln n/n for a constant c not equal 1 of [1]. In a nutshell, we add the case of c = 1 in b(n) similar to c ln n/n, where the graph can be connected or disconnected asymptotically, depending on the limit of beta(n). Finally, although a recent study by Eletreby and Ya. gan [2] uses the fine-grained scaling discussed before for a more complex graph model, their result (just like [1]) also demandsK(m,n)/K-1,K-n = o(ln n), which is less general than K-m,K-n/K-1,K-n = o(root n) addressed in this paper.
引用
收藏
页码:618 / 628
页数:11
相关论文
共 50 条
  • [1] Secure and reliable connectivity in heterogeneous wireless sensor networks
    Eletreby, Rashad
    Yagan, Osman
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2880 - 2884
  • [2] A Secure Scheme for Heterogeneous Sensor Networks
    Li, Sujun
    Wang, Weiping
    Zhou, Boqing
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (02) : 182 - 185
  • [3] A Secure Routing Protocol for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Guizani, Sghaier
    Xiao, Yang
    Chen, Hsiao-Hwa
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [4] Dominating connectivity and reliability of heterogeneous sensor networks
    Berman, KA
    Annexstein, FS
    Ranganathan, A
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 91 - +
  • [5] Secure Deployment with Optimal Connectivity in Wireless Sensor Networks
    Sangwan, Anju
    Singh, Rishipal
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2016, 7 (02) : 1 - 21
  • [6] Secure and efficient time synchronization in heterogeneous sensor networks
    Du, Xiaojiang
    Guizani, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (04) : 2387 - 2394
  • [7] Key Management and Secure Routing in Heterogeneous Sensor Networks
    Kausar, Firdous
    Saeed, Muhammad Qasim
    Masood, Ashraf
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 549 - 554
  • [8] A Continuous Secure Scheme in Static Heterogeneous Sensor Networks
    Zhou, Boqing
    Wang, Jianxin
    Li, Sujun
    Cheng, Yun
    Wu, Jie
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (09) : 1868 - 1871
  • [9] Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks
    Abid, Aasma
    Hussain, Mukhtar
    Kausar, Firdous
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 316 - +
  • [10] A secure time synchronization scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Guizan, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5143 - +