Skip to main content

Deterministic Evaluation of Identity Based Random Key Distribution Using Deployment Knowledge in WSNs

  • Conference paper
Advances in Computing, Communication, and Control (ICAC3 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 361))

  • 2824 Accesses

Abstract

With the recent developments in wireless communications, to achieve secure communications among sensor nodes in a Wireless Sensor Network (WSN), the research community has to resolve different technical issues like design and development of efficient node deployment and key distribution schemes. As the sensors are the resource constrained and vulnerable nodes, and are often deployed in hostile environments, an adversary may physically capture and compromise some of the nodes. Hence, deployment of nodes and key distribution are remained as challenging and basic issues to be addressed as they can influence the network performance metrics. Many schemes have been proposed in recent years for sensor node deployment and for key distribution. In this paper, we investigate a secure key distribution mechanism, such as Identity Based Random key Distribution scheme, for the two simple node deployment strategies, namely, Random and Grid. We first evaluate the key distribution protocol, and then we provide a comparative study that shows the improvements in the probabilistic prediction of the network performance resulting from inclusion of the two deployment schemes with the examined technique. We also show the simulation of deployment schemes of WSN using Network Simulator 2.34 with Mannasim.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Das, A.K.: Improving Identity-based Random Key Establishment Scheme for Large-scale Hierarchical Wireless Sensor Networks. International Journal of Network Security 13(3), 181–201 (2011)

    Google Scholar 

  2. Wang, Du, Liu: ShortPK: A Short- Term Public Key Scheme for Broadcast Authentication in Sensor Networks. ACM Transactions on Sensor Networks 6(1), Article 9 (2009)

    Google Scholar 

  3. Crossbow Technology Inc., Wireless Sensor Networks (2010), http://www.xbow.com

  4. Monica, Sharma, A.K.: Comparative Study of Energy Consumption for Wireless Networks based on Random and Grid Deployment Strategies. International Journal of Computer Applications (0975 – 8887) 6(1) (September 2010)

    Google Scholar 

  5. Yang, X., Wang, Y., Feng, W., Li, M., Liu, Y.H.: Random Deployment of wireless sensor Networks: Power of Second chance

    Google Scholar 

  6. Poe, W.Y., Schmitt, J.B.: Node Deployment in Large Wireless Sensor Networks: Coverage, Energy Consumption, and Worst-Case Delay. In: AINTEC 2009, Bangkok, Thailand, November 18-20 (2009)

    Google Scholar 

  7. Ruj, S., Roy, B.: Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACMTrans.Sensor Netw. 6(1), Article 4 (December 2009)

    Google Scholar 

  8. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197–213 (2003)

    Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)

    Google Scholar 

  10. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  11. Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)

    Article  Google Scholar 

  12. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.: A Survey on Sensor Networks IEEE Communications Magazine (August 2002)

    Google Scholar 

  13. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33(4), 792–807 (1986)

    Article  MathSciNet  Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Key Predistribution Scheme for Sensor Networks Using deployment Knowledge. IEEE Transactions on Dependable and Secure Computing (1) (2006)

    Google Scholar 

  15. Neuman, B.C., Tso, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Comm. 32(9), 33–38 (1994)

    Article  Google Scholar 

  16. Perrig, R., Szewczyk, V., Wen, D.: Cullar, and J.D. Tygar, Spins: Security Protocols for Sensor Networks. In: Proc. Seventh Ann. ACM/ IEEE Int’l Conf. Mobile Computing and Networking MobiCom, pp. 189–199 (July 2001)

    Google Scholar 

  17. The Network Simulator, NS-2, http://www.isi.edu/nsnam/ns/

  18. http://www.mannasim.dcc.ufmg.br/

  19. Sanjiv Rao, G., Valli Kumari, V.: A Study on Various Deployment Schemes for Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds.) CCSIT 2012, Part III. LNICST, vol. 86, pp. 495–505. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Lopez, Alonso, Sala, Marino, Haro: Simulation Tools for wireless sensor Networks

    Google Scholar 

  21. Younis, M., Akkaya, K.: Strtegies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Netw. 6(4), 621–655 (2008)

    Article  Google Scholar 

  22. Lee, J.C., Leung, V.C.M., Wong, K.H., Cao, J., Chan, H.C.B.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications (October 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hepsibha, P.S., Sanjiv Rao, G. (2013). Deterministic Evaluation of Identity Based Random Key Distribution Using Deployment Knowledge in WSNs. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36321-4_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36320-7

  • Online ISBN: 978-3-642-36321-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics