23
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme

&
Pages 660-674 | Published online: 13 Nov 2009

References

  • Blackburn , S. R. , Etzion , T. , Martin , K. M. and Paterson , M. B. . Efficient key predistribution for Grid-based Wireless sensor networks . Information Theoretic Security, Third International Conference, ICITS 2008 . Calgary, Canada. the Proceedings of , August , pp. 54 – 69 . LNCS 5155 .
  • Camtepe , S. A. and Yener , B. . Combinatorial design of key distribution mechanisms for wireless sensor networks . Proceedings of Computer Security- ESORICS 2004 . pp. 293 – 308 . Springer-Verlag, LNCS 3193 .
  • Camtepe , S. A. , Yener , B. and Yung , Moti . . Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks . The Proceedings of IEEE International Conference on Communications (ICC) 2006 . June , pp. 2262 – 2267 .
  • Chakrabarti , D. , Maitra , S. and Roy , B. K. 2006 . A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design . International Journal of Information Security , 5 ( 2 ) April : 105 – 114 .
  • Chan , H. , Perrig , A. and Song , D. . Random Key Predistribution Schemes for Sensor Networks . The Proceeding of IEEE Symposium on Security and Privacy . California, USA. pp. 197 – 213 .
  • Chan , H. and Perrig , A. . PIKE: Peer Intermediaries for Key Establishment in Sensor Networks . the Proceeding of INFOCOM 2005 . March , pp. 524 – 535 .
  • Du , W. , Deng , J. , Han , Y. S. and Varshney , P. K. 2006 . A key predistribution scheme for sensor networks using deployment knowledge . IEEE Transaction on Dependable and Secure Computing , 3 ( 1 ) January–March : 62 – 77 .
  • Du , W. , Deng , J. , Han , Y. S. and Varshney , P. K. . A pairwise key predistribution scheme for wireless sensor networks . Proceedings of 10th ACM Conference on Computer and Communication Security (CCS) . pp. 52 – 61 .
  • Eschenauer , L. and Gligor , V. D. 2002 . A Key-Management scheme for Distributed Sensor Network . IEEE Symposium on Security and Privacy , : 41 – 47 .
  • Gallais , A. , Carle , J. , Simplot-Ryl , D. and Stojmenovic , I. . Localized sensor area coverage with low communication overhead . Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom) . Italy. March 14–17 , pp. 328 – 337 .
  • Hwang , D. and Kim , Y. . Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks . the Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks . Washington, USA. pp. 43 – 52 . SASN .
  • Huang , D. , Mehta , M. , Medhi , D. and Harn , L. . Location-aware Key Management Scheme for Wireless Sensor Networks . the Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks . Washington, DC, USA. pp. 29 – 42 .
  • Kalindi , R. , Kannan , R. , Iyenger , S.S. and Durresi , A. 2006 . Sub-Grid based Key Vector Assignment: A key Pre-distribution for sensor networks . Journal of Pervasive Computing and Communications , 2 ( 1 ) : 35 – 43 .
  • Liu , D. and Ning , P. . Establishing pairwise keys in distributed sensor networks . Proceedings of ACMCCS 2003 . New York, USA. pp. 52 – 61 .
  • Liu , D. and Ning , P. . Location-based pairwise key establishments for static sensor networks . Proceedings of the 1st ACM Workshop on Security in Ad Hoc and Sensor Networks . October , pp. 72 – 82 .
  • Lee , J. and Stinson , D. . A combinatorial approach to key predistribution for distributed sensor networks . IEEE Wireless Communications and Networking Conference (WCNC 2005) . New Orleans, LA, USA. pp. 1200 – 1205 .
  • Lee , J. and Stinson , D. . Deterministic key predistribution schemes for distributed sensor networks . Proceedings of SAC 2004 . pp. 294 – 307 . LNCS 3357 .
  • Pishro-Nik , H. . Analysis of finite unreliable sensor grids . Proceedings of WiOpt 2006 . Boston. pp. 1 – 10 . Massachusetts .
  • Ruj , S. , Maitra , S. and Roy , B. 2008 . Key Predistribution using Transversal Design on a Grid of Wireless Sensor Network . Ad Hoc & Sensor Wireless Networks , 5 ( 3–4 ) : 247 – 264 .
  • Ruj , S. and Roy , B. . Key predistribution using partially balanced designs in wireless sensor networks . Proceedings of ISPA 2007 . pp. 431 – 445 . LNCS 4742 .
  • Simonova , K. , Ling , A. C. H. and Wang , X. S. . Location-aware key predistribution scheme for wide area wireless sensor networks . the Proceedings of the 4nd ACM Workshop on Security of Ad Hoc and Sensor Networks . Virginia, USA. pp. 157 – 168 .
  • Stojmenovic , I. 2005 . Handbook of sensor networks: algorithms and architecture , Wiley Interscience .
  • Sadi , M. G. , Kim , Dong S. and Park , J. S. . GBR: Grid Based random key predistribution for Wireless Sensor Network . Proceedings of ICPADS . Fukuoka, Japan. pp. 310 – 314 .
  • Shakkotai , S. , Srikant , R. and Shroff , N. . Unreliable sensor grids: coverage, connectivity and diameter . The proceedings of IEEE INFOCOM’03 . San Francisco, CA. pp. 1073 – 1083 .
  • Stinson , D. 2002 . Cryptology: theory and practice , 2nd , Boca Raton, Florida : Chapman & Hall, CRC Press .
  • Street , A. P. and Street , D. J. 1987 . Combinatorics of Experimental Design , Oxford : Clarendon Press .
  • Younis , M. F. , Ghumman , K. and Eltoweissy , M. 2006 . Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks . IEEE Transactions on Parallel and Distributed Systems , 17 ( 8 ) August : 865 – 882 .
  • Zhou , L. , Ni , J. and Ravishankar , C. V. . Supporting Secure Communication and Data Collection in Mobile Sensor Networks . Proceedings of INFOCOM 2006 . April , pp. 1 – 12 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.