Advertisement

Randomized Grid Based Scheme for Wireless Sensor Network

  • Mohammed Golam Sadi
  • Jong Sou Park
  • Dong Seong Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)

Abstract

Wireless Sensor Network (WSN) has a wide variety of civil and military applications need enforcement of security. Traditional public key cryptography such as RSA is infeasible due to resource constraints in WSN. Key predistribution is one of the feasible solutions to cope with these constraints. This paper proposes a novel key predistribution scheme named Randomized Grid Based (RGB) scheme which employs the basic probabilistic scheme on the basis of the grid based scheme. Our scheme is not only able to extend resiliency than the existing key predistribution schemes but also ensure a high probability to establish pairwise key and efficiency in path key establishment between sensor nodes. Security analysis shows substantial improvement in term of resiliency and key establishment with little additional overheads in memory, communication.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chan, H., Perrig, A., Song, D.X.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of the 2003 IEEE Sym. on Security and Privacy, p. 197 (2003)Google Scholar
  2. 2.
    Du, W., Deng, J., Han, S.Y., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. of the 10th ACM conf. on Computer and Communications Security, pp. 42–51 (2003)Google Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  4. 4.
    Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet. In: Proc. of 3rd IEEE Int. Conf. on Pervasive Computing and Communications, pp. 247–256 (2005)Google Scholar
  5. 5.
    Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 52–61 (2003)Google Scholar
  6. 6.
    Erods, P., Renyi, A.: On Random Graph. Publicationes Mathematicae, 290–297 (1959)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Mohammed Golam Sadi
    • 1
  • Jong Sou Park
    • 1
  • Dong Seong Kim
    • 1
  1. 1.Network Security Lab.Hankuk Aviation UniversityKorea

Personalised recommendations