Abstract
With the recent developments in wireless communications, to achieve secure communications among sensor nodes in a Wireless Sensor Network (WSN), the research community has to resolve different technical issues like design and development of efficient node deployment and key distribution schemes. As the sensors are the resource constrained and vulnerable nodes, and are often deployed in hostile environments, an adversary may physically capture and compromise some of the nodes. Hence, deployment of nodes and key distribution are remained as challenging and basic issues to be addressed as they can influence the network performance metrics. Many schemes have been proposed in recent years for sensor node deployment and for key distribution. In this paper, we investigate a secure key distribution mechanism, such as Identity Based Random key Distribution scheme, for the two simple node deployment strategies, namely, Random and Grid. We first evaluate the key distribution protocol, and then we provide a comparative study that shows the improvements in the probabilistic prediction of the network performance resulting from inclusion of the two deployment schemes with the examined technique. We also show the simulation of deployment schemes of WSN using Network Simulator 2.34 with Mannasim.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Das, A.K.: Improving Identity-based Random Key Establishment Scheme for Large-scale Hierarchical Wireless Sensor Networks. International Journal of Network Security 13(3), 181–201 (2011)
Wang, Du, Liu: ShortPK: A Short- Term Public Key Scheme for Broadcast Authentication in Sensor Networks. ACM Transactions on Sensor Networks 6(1), Article 9 (2009)
Crossbow Technology Inc., Wireless Sensor Networks (2010), http://www.xbow.com
Monica, Sharma, A.K.: Comparative Study of Energy Consumption for Wireless Networks based on Random and Grid Deployment Strategies. International Journal of Computer Applications (0975 – 8887) 6(1) (September 2010)
Yang, X., Wang, Y., Feng, W., Li, M., Liu, Y.H.: Random Deployment of wireless sensor Networks: Power of Second chance
Poe, W.Y., Schmitt, J.B.: Node Deployment in Large Wireless Sensor Networks: Coverage, Energy Consumption, and Worst-Case Delay. In: AINTEC 2009, Bangkok, Thailand, November 18-20 (2009)
Ruj, S., Roy, B.: Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACMTrans.Sensor Netw. 6(1), Article 4 (December 2009)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197–213 (2003)
Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y.: A Survey on Sensor Networks IEEE Communications Magazine (August 2002)
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33(4), 792–807 (1986)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Key Predistribution Scheme for Sensor Networks Using deployment Knowledge. IEEE Transactions on Dependable and Secure Computing (1) (2006)
Neuman, B.C., Tso, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Comm. 32(9), 33–38 (1994)
Perrig, R., Szewczyk, V., Wen, D.: Cullar, and J.D. Tygar, Spins: Security Protocols for Sensor Networks. In: Proc. Seventh Ann. ACM/ IEEE Int’l Conf. Mobile Computing and Networking MobiCom, pp. 189–199 (July 2001)
The Network Simulator, NS-2, http://www.isi.edu/nsnam/ns/
Sanjiv Rao, G., Valli Kumari, V.: A Study on Various Deployment Schemes for Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds.) CCSIT 2012, Part III. LNICST, vol. 86, pp. 495–505. Springer, Heidelberg (2012)
Lopez, Alonso, Sala, Marino, Haro: Simulation Tools for wireless sensor Networks
Younis, M., Akkaya, K.: Strtegies and techniques for node placement in wireless sensor networks: A survey. Ad Hoc Netw. 6(4), 621–655 (2008)
Lee, J.C., Leung, V.C.M., Wong, K.H., Cao, J., Chan, H.C.B.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications (October 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hepsibha, P.S., Sanjiv Rao, G. (2013). Deterministic Evaluation of Identity Based Random Key Distribution Using Deployment Knowledge in WSNs. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-36321-4_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36320-7
Online ISBN: 978-3-642-36321-4
eBook Packages: Computer ScienceComputer Science (R0)