Security in Wireless Sensor Networks:: Key Management Approaches
Security in Wireless Sensor Networks:: Key Management Approaches
Networks:
Key Management Approaches
number of hops
where
ln( n) c
p (2)
n n
Pc is a desired probability for the graph connectivity
Based on the formulas above p and d=p(n-1) can be found
(d-expected degree of a node)
Random-graphs (cont.)
k 2 ( P k 1 / 2)
(1 )
p' 1 P
2k ( P 2 k 1 / 2)
(1 )
P
Key ring and key pool size (cont.)
Problem:
How to pick a large key pool while still maintaining high
connectivity? (i.e maintain resilience while ensuring connectivity)
(e.g. 100,000 vs 200)
Solution:
Exploit Location information (Deployment Knowledge)
Du et. al. Infocom 2004. Exploit Location Knowledge for P-RKP
Huang et. Al. SASN 2004. Exploit Location Knowledge for SK-
RKP
Location Aware Purely Random
Key Predistribution (P-RKP)
S Si , j , i 1,...t , j 1..n
Detemining |Sc|
Local Connectivity
Plocal = Pr((B(n1,n2)|A(n1,n2))
Probability node is in a certain group is (1 / tn)
Probability that nodes i and j have local connectivity) is
1)Probability that n and n share a key (p-lambda) *
i j
Memory overhead
Security Analysis