Distribution of k-Connectivity in the Secure Wireless Sensor Network

被引:0
|
作者
Pandey, Jyoti [1 ]
Gupta, Bhupendra [1 ]
机构
[1] IIITDM Jabalpur, Jabalpur 482005, India
关键词
Sensor Networks; Secure Communication; Random Key Pre-Distribution Scheme;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper we are considering a wireless sensor network with secure communication. k-connectivity is one of the most desirable features in a wireless sensor network (WSN). It allows messages to be routed through one (or more) of at least k disjoint paths. This ensure that if some nodes along one of the paths fail, or compromised, the other paths can still be used for sending data. We derive mathematical expression for the probability of a wireless sensor network being k-connected. Also calculated the expected secure k-connectivity. We have given simulation resultstoo through which we are able to show that as thesize of the network increases, direct communication between the node decreases but the muti-hop communication increases.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] K-CONNECTIVITY IN RANDOM UNDIRECTED GRAPHS
    REIF, JH
    SPIRAKIS, PG
    DISCRETE MATHEMATICS, 1985, 54 (02) : 181 - 191
  • [42] Fault-tolerant deployment with k-connectivity and partial k-connectivitv in sensor networks
    Pu, Juhua
    Xiong, Zhang
    Lu, Xiaofeng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (07): : 909 - 919
  • [43] Weak and strong k-connectivity games
    Ferber, Asaf
    Hefetz, Dan
    EUROPEAN JOURNAL OF COMBINATORICS, 2014, 35 : 169 - 183
  • [44] On the rainbow k-connectivity of complete graphs
    Li, Xueliang
    Sun, Yuefang
    AUSTRALASIAN JOURNAL OF COMBINATORICS, 2011, 49 : 217 - 226
  • [45] Approximating subset k-connectivity problems
    Nutov, Zeev
    JOURNAL OF DISCRETE ALGORITHMS, 2012, 17 : 51 - 59
  • [46] On k-connectivity for a geometric random graph
    Penrose, MD
    RANDOM STRUCTURES & ALGORITHMS, 1999, 15 (02) : 145 - 164
  • [47] Asymptotic Critical Transmission Radius for k-Connectivity in Wireless Ad Hoc Networks
    Wan, Peng-Jun
    Yi, Chih-Wei
    Wang, Lixin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (06) : 2867 - 2874
  • [48] The capacity of k-connectivity d-dimensional wireless networks with node failure
    Li, Wei
    Liu, Junyu
    Sheng, Min
    Li, Jiandong
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (10)
  • [49] Secure Protocol for Wireless Sensor Network
    Pandey, Vinay Kumar
    Gupta, Gaurav
    Gupta, Sorabh
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1080 - 1083
  • [50] How to secure a wireless sensor network
    Law, YW
    Havinga, PJM
    PROCEEDINGS OF THE 2005 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2005, : 89 - 95