Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure

  • Keith M. Martin
  • Maura B. Paterson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5746)

Abstract

One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.

Keywords

wireless sensor networks key management one-dimensional networks 

References

  1. 1.
    Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Technical Report TR-05-07 (March 2005)Google Scholar
  2. 2.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)Google Scholar
  3. 3.
    Jawhar, I., Mohamed, N., Shuaib, K.: A framework for pipeline infrastructure monitoring using wireless sensor networks. In: Wireless Telecommunications Symposium, pp. 1–7 (2007)Google Scholar
  4. 4.
    Jawhar, I., Mohamed, N., Shuaib, K., Kesserwan, N.: Monitoring linear infrastructures using wireless sensor networks. In: The 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 2008), vol. 264, pp. 185–196. Springer, Heidelberg (2008)Google Scholar
  5. 5.
    Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security 11(2), 1–35 (2008)CrossRefGoogle Scholar
  6. 6.
    Lévêque, O., Preissmann, E.: Scaling Laws for One-Dimensional Ad Hoc Wireless Networks. IEEE Transactions on Information Theory 51(11), 3987–3991 (2005)MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Liu, B., Thiran, P., Towsley, D.: Capacity of a wireless ad hoc network with infrastructure. In: MobiHoc 2007: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 239–246. ACM, New York (2007)Google Scholar
  8. 8.
    Martin, K.M., Paterson, M.B.: An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science 192(2), 31–41 (2008)CrossRefMATHGoogle Scholar
  9. 9.
    Miorandi, D., Altman, E.: Connectivity in one-dimensional ad hoc networks: a queueing theoretical approach. Wireless Networks 12(5), 573–587 (2006)CrossRefGoogle Scholar
  10. 10.
    Mohamed, N., Jawhar, I.: A fault tolerant wired/wireless sensor network architecture for monitoring pipeline infrastructures. In: International Conference on Sensor Technologies and Applications, pp. 179–184 (2008)Google Scholar
  11. 11.
    Mohamed, N., Jawhar, I., Shuaib, K.: Reliability challenges and enhancement approaches for pipeline sensor and actor networks. In: Arabnia, H.R., Clincy, V.A. (eds.) ICWN, pp. 46–51. CSREA Press (2008)Google Scholar
  12. 12.
    Römer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications Magazine 11(6), 54–61 (2004)CrossRefGoogle Scholar
  13. 13.
    Stoianov, I.: Pipenet: A wireless sensor network for pipeline monitoring. In: IPSN 2007, pp. 264–273. ACM, New York (2007)Google Scholar
  14. 14.
    Wittenburg, G., Terfloth, K., Villafuerte, F.L., Naumowicz, T., Ritter, H., Schiller, J.H.: Fence monitoring – experimental evaluation of a use case for wireless sensor networks. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol. 4373, pp. 163–178. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(11-12), 2314–2341 (2007)CrossRefGoogle Scholar
  16. 16.
    Zimmerling, M.: An energy-efficient routing protocol for linear wireless sensor networks. In: Lecture Notes in Informatics, pp. 239–242 (2008)Google Scholar
  17. 17.
    Zimmerling, M., Dargie, W., Reason, J.M.: Localized power-aware routing in linear wireless sensor networks. In: CASEMANS 2008: Proceedings of the 2nd ACM international conference on Context-awareness for self-managing systems, pp. 24–33. ACM, New York (2008)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Keith M. Martin
    • 1
  • Maura B. Paterson
    • 1
  1. 1.Information Security GroupRoyal Holloway University of LondonEghamU.K.

Personalised recommendations