Skip to main content

A Key Predistribution Scheme Based on 3-Designs

  • Conference paper
Book cover Information Security and Cryptology (Inscrypt 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4990))

Included in the following conference series:

Abstract

In wireless distributed sensor networks, it is important for sensor nodes to communicate securely each other. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution scheme (KPS). In this paper, we shall use the Möbius plane to present a key predistribution scheme for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network will be analyzed in this paper. This KPS constructed in our paper has some better properties than the ones of KPSs constructed in [5],[7] and [9].

This work was partially supported by the National Natural Science Foundation (China) under Grant 60473017 and 90604034.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.B.: A key–management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACMCCS (2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy (2003)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varsheney, P.K.: A pairwise key predistribution scheme for wireless sensors. In: Proceeding of the 10th ACM Conference on Computer and Communications Security (CCS), October 2003, pp. 42–51 (2003)

    Google Scholar 

  4. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, ACMCCS (2003)

    Google Scholar 

  5. Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. Technical Report TR–04–10, RPI Dept. of Computer Science (April 2004)

    Google Scholar 

  6. Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for sonsor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)

    Google Scholar 

  7. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Computing and Networking Conference (WCNC 2005), New Orleans, LA, USA (2005)

    Google Scholar 

  8. Wei, R., Wu, J.: Product construction of key distribution schemes for network. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, Springer, Heidelberg (2004)

    Google Scholar 

  9. Pei, D., Dong, J., Rong, C.: A novel key pre-distribution scheme for wireless distributed sensor networks (preprint)

    Google Scholar 

  10. Street, A.P., Street, D.J.: Combinatorics of experimental design. Clarendon Press, Oxford (1987)

    MATH  Google Scholar 

  11. Pei, D.: Authentication codes and combinatorial designs. Chapman & Hall / CRC (2006)

    Google Scholar 

  12. Hua, L.K., Wan, Z.X.: Classical groups. Shanghai Science and Technology Press (1963)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dingyi Pei Moti Yung Dongdai Lin Chuankun Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dong, J., Pei, D., Wang, X. (2008). A Key Predistribution Scheme Based on 3-Designs. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79499-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79498-1

  • Online ISBN: 978-3-540-79499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics