Ebsco publishing ebook collection ebscohost printed

Info icon This preview shows pages 82–84. Sign up to view the full content.

View Full Document Right Arrow Icon
EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 82

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70 D. Liu, P. Ning and W. Du Specifically, we propose a novel group-based key pre-distribution frame- work based on this deployment model. Compared to the previous techniques for improving key pre-distribution, this framework has the following two ad- vantages. First, the expected or discovered locations of sensor nodes are no longer required for key pre-distribution. This simplifies the deployment of sensor networks when it is hard to deploy sensor nodes close to their ex- pected locations, and improves the security of key pre-distribution when it is hard to guarantee the correct location discovery. Second, this framework can be applied to improve any of the existing key pre-distribution schemes, while the previous techniques for improving key pre-distribution can only be used to improve certain types of key pre-distribution techniques. To seek practical key pre-distribution techniques, we also develop two efficient instantiations in this framework, a hash key-based scheme and a polynomial-based scheme . These two schemes have a number of advantages over the previous key pre-distribution schemes. First, in these two schemes, the neighbor sensor nodes have a high probability of establishing direct keys with low storage overhead, and there is no additional communication overhead required for direct key establishment. Second, they are resilient to node compromise attacks even if there are a large number of compromised sensor nodes. Finally, they provide efficient alternatives to achieve better security and performance when it is difficult to deploy the sensor nodes close to their expected locations or correctly estimate the sensors’ locations after deployment. The remainder of this chapter is organized as follows. The next sec- tion introduces our group-based deployment model. Section 3 presents our framework. Section 4 describes our two efficient instantiations of the pro- posed framework. Section 5 provides the detailed analysis for the proposed approaches. Section 6 reviews related work on sensor network security. Section 7 concludes this chapter and points out possible future research directions. 2. Group-Based Deployment Model When the sensor nodes are deployed in the target field, there are many factors that will affect where a sensor node will be finally deployed. For example, when a sensor node is dropped from an airplane, the final location of this sensor node will be at least affected by the location and the velocity of the airplane when the sensor node is dropped, and the wind speed. However, since the sensor nodes in the same group will be deployed together, it is Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law.
Image of page 83
Image of page 84
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern