Copyright 2010 world scientific publishing company

Info icon This preview shows pages 84–87. Sign up to view the full content.

Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 84

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

72 D. Liu, P. Ning and W. Du 0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 1 2 3 4 5 6 7 x 10 -5 Fig. 1. Deployment distribution. Specifically, we assume that the deployment distribution for any node in the deployment group G i follows a two-dimensional Gaussian distribution centered at a deployment point ( x i , y i ). Different from the previous deploy- ment models where the deployment points are pre-determined, 12,15 we do not assume any prior knowledge of such deployment points. In fact, we only assume the existence of such deployment points . The mean of the Gaussian distribution µ equals ( x i , y i ), and the pdf for any sensor node in group G i is the following: f i ( x, y ) = 1 2 πσ 2 e [( x x i ) 2 +( y y i ) 2 ] / 2 σ 2 = f ( x x i , y y i ) , (1) where σ is the standard deviation, and f ( x, y ) = 1 2 πσ 2 e ( x 2 + y 2 ) / 2 σ 2 . 3. A Framework for Group-Based Key Pre-Distribution According to the deployment model discussed in the previous section, the sensor nodes in the same deployment group have high probability of being neighbors. To take advantage of this observation, the pairwise key pre- distribution techniques should at least benefit the sensor nodes in the same deployment group. Hence, we first employ an in-group key pre-distribution method, which enables the sensor nodes in the same deployment group to establish pairwise keys between each other with a high probability. To Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 85
Key Pre-Distribution for Sensor Networks Using Group Deployment Knowledge 73 handle the pairwise key establishment between the sensor nodes in differ- ent deployment groups, we then employ a cross-group key pre-distribution method, which enables the selected sensor nodes in different deployment groups to establish pairwise keys and thus bridges different deployment groups together. A key pre-distribution technique can usually be divided into three dif- ferent phases, the pre-distribution , which specifies how to pre-distribute keying materials to each sensor node, the direct key establishment , which specifies how to establish a pairwise key shared between two sensor nodes directly , and the path key establishment , which specifies how to discover a sequence of sensor nodes to help two given sensor nodes to establish a tem- porary session key. A key established in the direct key establishment phase is called a
Image of page 86

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 87
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern