WISTP 2009: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks pp 143-152 | Cite as
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure
Abstract
One-dimensional wireless sensor networks are important for such security-critical applications as pipeline monitoring and perimeter surveillance. When considering the distribution of symmetric keys to secure the communication in such networks, the specific topology leads to security and performance requirements that are markedly distinct from those of the more widely-studied case of a planar network. We consider these requirements in detail, proposing a new measure for connectivity in one-dimensional environments. We show that, surprisingly, optimal results may be obtained through the use of extremely lightweight key predistribution schemes.
Keywords
wireless sensor networks key management one-dimensional networksReferences
- 1.Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Technical Report TR-05-07 (March 2005)Google Scholar
- 2.Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM Press, New York (2002)Google Scholar
- 3.Jawhar, I., Mohamed, N., Shuaib, K.: A framework for pipeline infrastructure monitoring using wireless sensor networks. In: Wireless Telecommunications Symposium, pp. 1–7 (2007)Google Scholar
- 4.Jawhar, I., Mohamed, N., Shuaib, K., Kesserwan, N.: Monitoring linear infrastructures using wireless sensor networks. In: The 2008 IFIP Conference on Wireless Sensor and Actor Networks (WSAN 2008), vol. 264, pp. 185–196. Springer, Heidelberg (2008)Google Scholar
- 5.Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security 11(2), 1–35 (2008)CrossRefGoogle Scholar
- 6.Lévêque, O., Preissmann, E.: Scaling Laws for One-Dimensional Ad Hoc Wireless Networks. IEEE Transactions on Information Theory 51(11), 3987–3991 (2005)MathSciNetCrossRefMATHGoogle Scholar
- 7.Liu, B., Thiran, P., Towsley, D.: Capacity of a wireless ad hoc network with infrastructure. In: MobiHoc 2007: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, pp. 239–246. ACM, New York (2007)Google Scholar
- 8.Martin, K.M., Paterson, M.B.: An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science 192(2), 31–41 (2008)CrossRefMATHGoogle Scholar
- 9.Miorandi, D., Altman, E.: Connectivity in one-dimensional ad hoc networks: a queueing theoretical approach. Wireless Networks 12(5), 573–587 (2006)CrossRefGoogle Scholar
- 10.Mohamed, N., Jawhar, I.: A fault tolerant wired/wireless sensor network architecture for monitoring pipeline infrastructures. In: International Conference on Sensor Technologies and Applications, pp. 179–184 (2008)Google Scholar
- 11.Mohamed, N., Jawhar, I., Shuaib, K.: Reliability challenges and enhancement approaches for pipeline sensor and actor networks. In: Arabnia, H.R., Clincy, V.A. (eds.) ICWN, pp. 46–51. CSREA Press (2008)Google Scholar
- 12.Römer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications Magazine 11(6), 54–61 (2004)CrossRefGoogle Scholar
- 13.Stoianov, I.: Pipenet: A wireless sensor network for pipeline monitoring. In: IPSN 2007, pp. 264–273. ACM, New York (2007)Google Scholar
- 14.Wittenburg, G., Terfloth, K., Villafuerte, F.L., Naumowicz, T., Ritter, H., Schiller, J.H.: Fence monitoring – experimental evaluation of a use case for wireless sensor networks. In: Langendoen, K.G., Voigt, T. (eds.) EWSN 2007. LNCS, vol. 4373, pp. 163–178. Springer, Heidelberg (2007)CrossRefGoogle Scholar
- 15.Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30(11-12), 2314–2341 (2007)CrossRefGoogle Scholar
- 16.Zimmerling, M.: An energy-efficient routing protocol for linear wireless sensor networks. In: Lecture Notes in Informatics, pp. 239–242 (2008)Google Scholar
- 17.Zimmerling, M., Dargie, W., Reason, J.M.: Localized power-aware routing in linear wireless sensor networks. In: CASEMANS 2008: Proceedings of the 2nd ACM international conference on Context-awareness for self-managing systems, pp. 24–33. ACM, New York (2008)CrossRefGoogle Scholar