Abstract
There is a set of applications in wireless sensor networks that forms a particular topology through specific placements of sensor nodes. This set is known as linear infrastructure or one dimensional network. Applications of such networks are subway tunnel or pipeline monitoring and perimeter surveillance. These applications often demand critical security concerns. Distribution of symmetric keys for such networks is different from those that are planner and are widely studied. By considering requirements for such linear infrastructure in detail, we observe that connectivity is an important issue as capturing a single node disrupts the entire network’s services. Therefore, we propose a new measure of connectivity that produces the optimal results with acutely lightweight key predistribution schemes (KPS). We also show the theoretical analysis of our proposed scheme and prove how it produces optimal results with lesser storage requirements as compared to other schemes. The performance analysis shows that the proposed KPS requires lesser number of keys per node (O(1) constant storage), as compared to the other existing schemes in the literature to provide the same level of connectivity.
Similar content being viewed by others
References
Romer, K., & Mattern, F. (2004). The design space of wireless sensor networks. IEEE Wireless Communications, 1(6), 54–61. doi:10.1109/mwc.2004.1368897.
Martin, K. M., & Paterson, M. (2008). An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science, 192(2), 31–41. doi:10.1016/j.entcs.2008.05.004.
Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report (pp. 05–07).
Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11), 2314–2341. doi:10.1016/j.comcom.2007.04.009.
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security, New York, NY, USA. doi:10.1145/586115.586117.
Chen, C. Y., & Chao, H. C. (2014). A survey of key distribution in wireless sensor networks. Security and Communication Networks, 7(12), 2495–2508. doi:10.1002/sec.354.
Martin, K. M., & Paterson, M. B. (2009). Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure. In Proceedings of the 3rd IFIP WG 11.2 international workshop on information security theory and practice. Smart Devices, pervasive systems, and ubiquitous networks (pp. 143–152). Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-03944-7-11.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258. doi:10.1145/1065545.1065548.
Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959. doi:10.1109/twc.2012.010413.120732.
Hazra, P., Giri, D., & Das, A. K. (2015). Key chain-based key predistribution protocols for securing wireless sensor networks. In Springer mathematics and computing (pp. 135–154). doi:10.1007/978-81-322-2452-5_10.
Sahingoz, O. K. (2013). Multi-level dynamic key management for scalable wireless sensor networks with uav. In Springer ubiquitous information technologies and applications (pp. 11–19). doi:10.1007/978-94-007-5857-5_2.
Lévêque, O., & Preissmann, E. (2005) Scaling laws for one-dimensional adhoc wireless networks. IEEE transactions on information theory, 51(LTHI-ARTICLE-2006-011) (pp. 3987–3991). doi:10.1109/isit.2005.1523559.
Liu, B., Thiran, P., & Towsley, D. (2007) Capacity of a wireless ad hoc network with infrastructure. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing, New York, NY, USA (pp. 239–246). doi:10.1145/1288107.1288140.
Miorandi, D., & Altman, E. (2006). Connectivity in one-dimensional ad hoc networks: A queueing theoretical approach. Wireless Networks, 12(5), 573–587. doi:10.1007/s11276-006-6536-z.
Zimmerling, M., Dargie, W., & Reason, J. M. (2008). Localized power-aware routing in linear wireless sensor networks. In Proceedings of the 2nd ACM international conference on context-awareness for self-managing systems, New York, NY, USA (pp. 24–33). doi:10.1145/1367943.1367946.
Shah, K., & Jinwala, D. C. (2016). A secure expansive aggregation in wireless sensor networks for linear infrastructure. In IEEE Region 10 symposium (TENSYMP) (pp. 207–212). doi:10.1109/tenconspring.2016.7519406.
Henry, K. J., & Stinson, D. R. (2014). Resilient aggregation in simple linear sensor networks. IACR cryptology ePrint Archive (pp. 288–310).
Henry, K. J., & Stinson, D. R. (2015). Linear approaches to resilient aggregation in sensor networks. Journal of Mathematical Cryptology, 9(4), 245–272. doi:10.1515/jmc-2015-0042.
Jawhar, I., Mohamed, N., Shuaib, K., & Kesserwan, N. (2008). Monitoring linear infrastructures using wireless sensor networks. In Wireless sensor and actor networks II, IFIP the international federation for information processing vol. 264, (pp. 185–196). US: Springer. doi:10.1007/978-0-387-09441-0_16.
Stoianov, I., Nachman, L., Madden, S., & Tokmouline, T. (2007). Pipeneta wireless sensor network for pipeline monitoring. In Proceedings of the 6th international conference on information processing in sensor networks, ACM, New York, NY, USA (pp. 264–273). doi:10.1145/1236360.1236396.
Jawhar, I., Mohamed, N., & Shuaib, K. (2007). A framework for pipeline infrastructure monitoring using wireless sensor networks. In IEEE wireless telecommunications symposium (pp. 1–7). doi:10.1109/wts.2007.4563333.
Mohamed, N., & Jawhar, I. (2008). A fault tolerant wired/wireless sensor network architecture for monitoring pipeline infrastructures. In Second IEEE international conference on sensor technologies and applications, SENSORCOMM’08 (pp. 179–184). doi:10.1109/sensorcomm.2008.116.
Mohamed, N., Jawhar, I., & Shuaib, K. (2008). Reliability challenges and enhancement approaches for pipeline sensor and actor networks. In International conference on wireless networks (pp. 46–51).
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501. doi:10.1007/s11276-014-0761-7.
Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key predistribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 433–457. doi:10.1007/s10623-012-9749-4.
Jan, M., Nanda, P., Usman, M., & He, X. (2016). Pawn: A payload-based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience. doi:10.1002/cpe.3986.
Blackburn, S. R., Etzion, T., Martin, K. M., & Paterson, M. B. (2008). Efficient key predistribution for grid-based wireless sensor networks. In International conference on information theoretic security (pp. 54–69). Springer. doi:10.1007/978-3-540-85093-9_6.
Golomb, S. W., & Taylor, H. (1984). Constructions and properties of costas arrays. Proceedings of the IEEE, 72(9), 1143–1163. doi:10.1109/PROC.1984.12994.
Jawhar, I., Mohamed, N., Al-Jaroodi, J., & Zhang, S. (2014). A framework for using unmanned aerial vehicles for data collection in linear wireless sensor networks. Journal of Intelligent & Robotic Systems, 74(1–2), 437–453. doi:10.1007/s10846-013-9965-9.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shah, K.A., Jinwala, D.C. Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure. Wireless Pers Commun 95, 3905–3921 (2017). https://doi.org/10.1007/s11277-017-4031-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4031-8