Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Nested block design as key pre-distribution in wireless sensor networks

    An accumulation of wireless sensor nodes is combined together to form the Wireless Sensor Networks. The sensor nodes are distributed haphazardly without any decided method into a natural setting, which is generally inhospitable and it is difficult to provide key-chains to each node for security as they are haphazardly distributed. In this paper, we use Nested Block Design (NBD) as Key Pre-distribution Scheme (KPS) and found out that NBD support large networks with fewer keys in each node than Symmetric Balanced Incomplete Block Designs (SBIBD) and Transversal Design (TD(2,k,q)), provide higher resiliency than SBIBDs and better connectivity than TD(2,k,q), tradeoff between local connectivity and resiliency (ρ) is lower than SBIBD but more than TD(2,k,q) and key-node ratio (σ) is same for TD(2,k,q) but lower than SBIBD.

  • chapterNo Access

    Key Management in Wireless Sensor Networks

    Establishing pairwise symmetric keys is a critical resource management issue in wireless sensor networks. Usually deployed in a hostile environment where malicious users or adversaries are bound to exist, wireless sensors are subject to a general attack model—a sensor node can be captured, re-programmed, and consequently exhibit arbitrary faulty behaviors. Thus, sensor key management is a challenging research issue, attracting a high level of interests in recent years. In general, a key management system works by first pre-allocating some keys to each sensor before deployment. After deployment, neighboring sensors can undergo a discovery process to set up shared keys for secure communications. An efficient key management scheme has to work under severe system constraints including limited memory storage and communication overhead in each sensor. In this chapter we provide a detailed survey of state-of-the-art sensor key management techniques that have demonstrated a high degree of effectiveness.