Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments

被引:0
|
作者
Abdülhakim Ünlü
Albert Levi
机构
[1] Sabancı University,Faculty of Engineering and Natural Sciences
来源
关键词
security; authentication; key management; sensor networks; resiliency against node capture attacks;
D O I
暂无
中图分类号
学科分类号
摘要
We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost by using minimal flooding in key distribution. Moreover, we show that our scheme is scalable such that no extra overhead in incurred in case of increased number of nodes and sensor field size. Most importantly, simulation results show that our scheme is highly resilient to node captures.
引用
收藏
页码:517 / 529
页数:12
相关论文
共 50 条
  • [21] A two-tier test approach to developing location-aware mobile learning systems for natural science courses
    Chu, Hui-Chun
    Hwang, Gwo-Jen
    Tsai, Chin-Chung
    Tseng, Judy C. R.
    COMPUTERS & EDUCATION, 2010, 55 (04) : 1618 - 1627
  • [22] An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks
    Bechkit, Walid
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    Bencheikh, Ahlem
    IEEE LOCAL COMPUTER NETWORK CONFERENCE, 2010, : 216 - 219
  • [23] Location-aware security services for wireless sensor networks using network coding
    Ayday, Erman
    Delgosha, Farshid
    Fekri, Faramarz
    INFOCOM 2007, VOLS 1-5, 2007, : 1226 - +
  • [24] A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks
    Qiang Gao
    Wenping Ma
    Wei Luo
    Wireless Personal Communications, 2017, 96 : 2179 - 2204
  • [25] KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network
    Singh, Moutushi
    Das, Rupayan
    Sarkar, Mrinal Kanti
    Majumder, Koushik
    Sarkar, Subir Kumar
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 679 - 690
  • [26] A Chaos-based Key Predistribution amd Management Scheme in Wireless Sensor Network
    Zhang Jian-hua
    Zhang Nan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 342 - 346
  • [27] A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks
    Gao, Qiang
    Ma, Wenping
    Luo, Wei
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2179 - 2204
  • [28] Location-aware random pair-wise keys scheme for wireless sensor networks
    Chun, Ji Young
    Kim, Yong Ho
    Lim, Jongin
    Lee, Dong Hoon
    THIRD INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, : 31 - +
  • [29] A Personalized Two-Tier Cloaking Scheme for Privacy-Aware Location-Based Services
    Niu, Ben
    Zhu, Xiaoyan
    Li, Weihao
    Li, Hui
    Wang, Yingjuan
    Lu, Zongqing
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 94 - 98
  • [30] Two-Tier Receiver-Initiated Secure Scheme for Hierarchical Wireless Sensor Networks
    Hsueh, Ching-Tsung
    Wen, Chih-Yu
    Ouyang, Yen-Chieh
    2012 12TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS (ITST-2012), 2012, : 248 - 252