Connectivity Preservation and Key Distribution in Wireless Sensor Networks Using Multi-deployment Scheme

  • David Simplot-Ryl
  • Isabelle Simplot-Ryl
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)


Secure key establishment in wireless sensor networks has been shown to be efficient. For sake of computation power, pre- distribution of symmetric keys is recommended. In such schemes, a set S of keys is used and each deployed node knows a subset of S. However, the capture of nodes can quickly lead to the corruption of a significant part of the network and solutions like multi-deployment have been proposed. In multi-deployment schemes, sets of nodes – using different key sets – are sequentially deployed that limits the impact of the capture of nodes. In this paper, we consider the problem of connectivity of single deployment in regards to the size of key sets. We show that connectivity guaranteed solutions lead to network vulnerability when nodes are captured. Then we evaluate network robustness of different schemes.


Sensor Network Wireless Sensor Network Network Lifetime Unit Disk Graph Distribute Sensor Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38, 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security (CCS 2002), pp. 41–47 (2002)Google Scholar
  3. 3.
    Durresi, A., Bulusu, V., Paruchuri, V., Barolli, L.: Secure and continuous management of heterogeneous ad hoc networks. In: Proc. 20th International Conference on Advanced Information Networking and Applications - (AINA 2006), vol. 1, pp. 511–516. IEEE Computer Society Press, Los Alamitos (2006)CrossRefGoogle Scholar
  4. 4.
    Michiardi, P., Molva, R.: Ad hoc network security. In: Basagni, S., Conti, M., Giordano, S., Stojmenovic, I. (eds.) Mobile Ad Hoc Networking, pp. 329–354. Wiley-IEEE Press (2004)Google Scholar
  5. 5.
    Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc networks. In: Proc of MobiHoc, pp. 226–236. ACM, New York (2002)Google Scholar
  6. 6.
    Hauspie, M., Simplot-Ryl, I.: Cooperation in ad hoc networks: Enhancing the virtual currency based models. In: Proc. of the 1st International Conference on Integrated Internet Ad hoc and Sensor Networks (InterSense 2006) (2006)Google Scholar
  7. 7.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004) (2004)Google Scholar
  9. 9.
    Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (S&P 2003), pp. 197–213. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  10. 10.
    Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group key management scheme for large-scale sensor networks. Ad Hoc Networks 3(5), 668–688 (2005)CrossRefGoogle Scholar
  11. 11.
    Gallais, A., Carle, J., Simplot-Ryl, D., Stojmenovic, I.: Localized sensor area coverage with low communication overhead. In: 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006) (2006)Google Scholar
  12. 12.
    Carle, J., Simplot-Ryl, D.: Energy efficient area monitoring by sensor networks. IEEE Computer 37(2), 40–46 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • David Simplot-Ryl
    • 2
  • Isabelle Simplot-Ryl
    • 1
  1. 1.IRCICA/LIFLUniv. Lille 1, CNRS UMR 8022 
  2. 2.POPS research groupINRIA FutursVilleneuve d’AscqFrance

Personalised recommendations