SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 1
SECURE AND EFFICIENT KEY PRE DISTRIBUTION SCHEMES FOR
WSN USING COMBINATORIAL DESIGN
IshwaryaMathi Manickavasagam
1
, MadanMohan Anbalagan
2
, Sivasankar Sundaram3
1
Department of ECE, Chennai, India
2
Department of ECE, Chennai, India
3
Department of ECE, Chennai, India
Abstract
Efficient Key Distribution is essential among sensor nodes. Pairwise and Triple Key Distribution in wireless sensor networks is
established using Combinatorial Design. Sensor networks which are used in many applications require secure communication
between the nodes. The need for secure communication is to protect the information from unauthorized access and to provide
authentication between nodes. In this paper, the combinatorial Design which is used, is followed by Randomized key predistribution
are applied to sensor nodes. The algorithm used in this scheme is to improve and increase the connectivity and resilience factor
between the nodes. This scheme aims at increasing computation efficiency, communication and security.
Keywords—pair wise, triple key distribution, randomized key pre distribution, resilience
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
A WSN is spatially distributed sensors which are used to
observe physical or environmental conditions such as sound,
pressure and temperature, etc and to pass their information all
the way through the network to a main location.
The improvement of WSN was aggravated by military
applications such as battlefield observation. Today such
networks are used in many consumer and industrial
applications, such as machine health monitoring, industrial
process monitoring and control, etc.
The WSN is built of „notes‟ from a few to several hundreds or
even thousands, where each node is connected to one or
several sensors. Each such sensor network node has typically
several parts: a micro controller, a radio transceiver with an
internal antenna or connection to an external antenna, an
electronic circuit for interfacing with the sensors and an energy
source, usually a battery or an embedded form of energy
harvesting. A Sensor node might vary in size from that of a
shoebox down to the size of a grain of dust, although
functioning „motes‟ of authentic microscopic dimensions have
yet to be created. The cost of the sensor node is variable which
depends upon the complication of the individual sensor nodes.
Depending upon the size and cost on sensor nodes results in
corresponding constraints on resources such as memory,
energy, communication bandwidth and computational speed.
The topology of the WSN can vary from a simple star network
to a advanced multi-hop wireless mesh network. The
transmission technique between the hops of the network can be
routing or flooding. Sensor nodes can be expected as small
computers, extremely basic in terms of their interfaces and
their components. They usually consist of processing unit with
limited computational power and limited memory, sensors or
MEMS, a communication device and a power source usually in
the form of battery.
The connectivity of the network involves two aspects:
Local connectivity requires that neighboring nodes either share
or there exists a path between them consisting of secure links.
Global connectivity requires that there exist a path between
any two nodes in the network, consisting of hops with link
keys.
Sensor nodes can be imagined as small battery powered
devices which are deployed in large number to sense abd
collect information for various applications ranging from
health care to military applications.
2. RELATED WORK
Ruj S., Nayak, A. and Stojmenovic, I., proposed the scheme
based on selected key distribution and the cost of using this
scheme in combinatorial design is very high when compared to
other schemes [1]. Camtepe, S.A. and Yener, B., futher
extended the idea and developed randomized key distribution
scheme. The main disadvantage of using this scheme is that it
is not scalable [2]. Khalid S.,Ahmad F., Beg M.A., in this
scheme, the nodes are assumed to be deployed based on Trivial
Pairwise key distribution and this scheme is scalable and is
limited in memory size [3]. Lee, J. and Stinson, D., proposed
Single secret key which results in compromise of single nodes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 2
lead to compromise of all nodes and it is not suitable for large
networks [4]. Chakrabarti D., Maitra S and Roy B., nodes are
assumed to be deployed based on Randomized block merging
which results in terms of loss in connectivity. By using
Orthogonal latin square, it is increased in terms of connectivity
and resilience factor. This scheme shows a improved link
establishment and connectivity graph when compared to other
schemes.
3. KEY PRE DISTRIBUTION
A good key pre distribution scheme should be resilient to node
compromise. There are two ways of distributing the keys to
the nodes. One way of pre distribution is to load all the nodes
with a single common master key, resulting in an finest storage
and full connectivity of the network. However if one node is
compromised then the entire network becomes insecure. At
the other extreme, each pair of nodes can share a unique key.
Initially after deployment of sensor nodes, the key pre
distribution is done, where key pre distribution is carried out in
three phases. After the deployment of sensor nodes, the keys
are distributed to the nodes which are considered, where keys
are generated depending upon the algorithm of orthogonal latin
squares. Then shared key discovery phase takes place in which
the nodes look for common keys in the sensor nodes and the
next phase is path key establishment phase in which if there are
common keys between two nodes then a path will be
established between the nodes.
There are three phases for key pre distributions:
3.1 Key Pre Distribution Phase:
Prior to the deployment of the sensor network, all nodes obtain
a distinct subset of keys, based on the scheme. Every sensor
node is equipped with a fixed number of keys randomly chosen
from the number of nodes assigned.
3.2 Shared Key Discovery Phase:
When two nodes in wireless communication range look for
their common keys and if the nodes have common keys then
link will be established between the sensor nodes.
3.3 Path Key Establishment Phase:
Assigns a path key to selected pairs of sensor nodes in wireless
communication range at the end of shared key Discovery phase
4. COMBINATORIAL DESIGN
Combinatorial Design provides a fitting balance of key at ease
in various sensor nodes. Using this policy maximum number
of node pair can communicate directly using pairwise common
key. Combinatorial Design consist s of many types and
Orthogonal latin square is one of the type, which deals
depending upon the matrix.
In this paper, we perform the algorithm of Orthogonal Latin
Squares based on Combinatorial Design.
4.1 Orthogonal Latin Square
In Orthogonal Latin Squares n x n matrix or n matrix can be
considered to generate the keys for the assigned sensor nodes.
Depending upon the order of the matrix which is considered.
The keys are assigned accordingly.
Example: 1
1 2 3
2 3 1
3 1 2
In this case, we consider 3x3 matrix and keys are generated as
(r,c,s)
Where r represents the row and c represents the column and s
represents the symbol from the matrix.
The keys from the assigned matrix are generated as (1,1,1),
(1,1,1), (1,2,2), (1,3,3), (2,1,2), (2,2,3), (2,3,1), (3,1,3), (3,2,1),
(3,3,2).
Example: 2
When 2 matrixes say L1 & L2 are considered. The keys can
be generated as
L1=
1 2 3
2 3 1
3 1 2
& L2=
1 2 3
3 1 2
2 3 1
(1,1),(2,2), (3,3), (2,3), (3,1), (1,2), (3,2), (1,3), (2,1) and thus
keys are generated.
4.2 Link Establishment
The Key Distribution between sensor nodes takes place by
assigning key values to the nodes in the sensor network and
distributing the keys to the nodes in the network. The sensor
node which has a common key will establish a link.
In Orthogonal Latin Square based key pre distribution scheme,
depending upon the algorithm, the key values are generated
and is distributes randomly to all the sensor nodes which is
present. The sensor nodes which share a common key will
establish a link between the nodes. In this scheme a new
approach has been proposed to establish a secure
communication between the sensor nodes with desired
scalability and resiliency.
When two nodes share more than one shared key, the amount
of data transferred will be high when compared to one shared
key and the bandwidth consumption will also be less when
compared to the others.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 3
Flow Chart for Link Establishment using Orthogonal Latin
Square
Fig: 1 Flow Chart for Link Establishment
Fig.1 shows the flow chart for link establishment how keys are
established depending upon the algorithm of orthogonal latin
squares, if there is common key then link will be established
between those nodes and if there is no common keys then it
will look again with other nodes for common keys.
Fig.2 Link Establishment between sensor nodes
Fig.2 shows the graph between the sensor nodes. In this
Figure, the number of nodes considered 10 and order of the
matrix is 10. Depending upon the algorithm of Orthogonal
Latin square, the keys are generated and distributed among the
sensor nodes. If there is common key between the nodes, then
link will be established. The overlapping of common keys
shows that there are more than one common key. If there is
more than one common key, the data transferred will be more
and bandwidth consumption will be less when compared to the
others.
4.3 Connectivity Analysis
We have analyzed that presence of our scheme based on
connectivity between sensor nodes in the network. For
security, we present the probability of the node being
compromised.
A network node should be able to securely communicate to its
local neighbors means a network node physically located
within transmission range.
Using connectivity theory, we can obtain the necessary
expected node degree d (i.e average number of edges
connected to each node) for a network of size N, when N is
large, in order to achieve a given global connectivity, pc.
d =
N−1
N
[ln N − ln⁡(−ln⁡(pc))] (1)
Where N is the number of node, pc gives the probability of
connectivity.
0 1 2 3 4 5 6 7 8 9 10
1
2
3
4
5
6
7
8
orthogonal latin square approach
location of x
locationofy
1
2
3
4
5
6
7
8
9
10
34
4
2
23
45
5
3
56
6
67
7
78
8
89
9
910
10
101
1
12
Start
Specify number of nodes
Assign keys to the node
Key Generation using Orthogonal
Latin Square
Link will not be established
between Nodes
Establish connection between
Nodes
Locate Position of the Node on
XY
Plane
Stop
Common
Keys
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 4
Fig 3 Connectivity Analysis between sensor nodes
Fig.3 shows number of node versus degree of node. From the
graph we infer that connectivity increases as the number of
node increase and hence this scheme is not scalable. When 3
be the number of node considered, for pc value 0.999, we get
approximately 18 as degree of node. When 6 be the number of
node considered, for pc value 0.9999, we get approximately 18
as degree of node.
We have analyzed that presence of our scheme based on
connectivity between sensor nodes in the network. For
security, we present the probability of the node being
compromised. Using connectivity theory, we can obtain the
necessary expected node degree d ( i.e average number of
edges connected to each node ) for a network of size N, when
N is large, in order to achieve a given global connectivity, pc.
5. SIMULATED RESULTS
We implement our proposed scheme using MATLAB tool.
For Link Establishment between sensor nodes in wireless
sensor network we assigned the number of sensor nodes to be
10. Link Establishment between sensor node is based on the
algorithm of Orthogonal Latin Square. For connectivity
analysis, we simulated the results by assigning the total number
of sensor nodes in the network n to be 10, and degree of the
node to be 15 and graph is plotted by varying different pc
values.
6. CONCLUSIONS
From the above simulated results, we conclude that our
Orthogonal Latin Square scheme which is carried by
randomized key pre distribution has increased probability of
connectivity. Our scheme provides security framework
provides better resilient.
REFERENCES
[1] Ruj S., Nayak A. and Stojmenovic I.,(Nov. 2013)
„Pairwise and Triple Key Distribution in Wireless
Sensor Networks with Applications‟, IEEE Trans. On
Computers., Vol.62, No.11, pp.2224-2237.
[2] Camtepe, S.A. and Yener, B.,(April 2007)
„Combinatorial Design of Key Distribution Mechanisms
for Wireless Sensor Networks‟, IEEE/ACM Trans. on
Networking., Vol.15, No.2, pp.346-358.
[3] Khalid S.,Ahmad F., Beg M.A.,(2012), ‘Secure Key
Pre-distribution in Wireless Sensor Networks Using
Combinatorial Design and Traversal Design Based
Key Distribution‟, Vol.No.1, Issue‐4, pp.2248‐9738.
[4] Lee, J. and Stinson, D.,(2004) „Deterministic key
predistribution schemes for distributed sensor
networks‟, SAC, LNCS Vol.No.3357, pp. 294-307.
[5] Chakrabarti D., Maitra S .and Roy B.,(March 2006), „ A
key pre-distribution scheme for wireless sensor
networks: merging blocks in combinatorial design‟,
Vol.No.5, pp.105-114.
[6] Behrouz A.Forouzan , Debdeep Mukhopadhyay,
Cryptography and Network Security,2nd Edition,,Tata
Mc Graw Hill Education private edition
[7] William Stallings,cryptography and network security
principles and practice, Fourth Edition,Pearson
Publications ,2006.
[8] Ruj, S., Nayak, A. and Stojmenovic, I.,(April 2011)
„Fully secure pairwise and triple key distribution in
wireless sensor networks using combinatorial designs‟,
INFOCOM, 2011 Proceedings IEEE , Vol., No. 10,
pp.326-330.
[9] C. J. Colbourn and J. H. Dinitz, The CRC Handbook of
Combinatorial Designs. CRC Press, 1995.
[10] H. Chan, A. Perrig, and D. X. Song, “Random key
predistribution schemes for sensor networks,” in IEEE
Symposium on Security and Privacy. IEEE Computer
Society, 2003, pp. 197–213.
[11] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and
A. Khalili, “A pairwise key predistribution scheme for
wireless sensor networks,” ACM Trans. Inf. Syst.
Secur., vol. 8, no. 2, pp. 228–258, 2005.
1 2 3 4 5 6 7 8 9 10
5
10
15
20
25
Connectivity
no of node
Degreeofnode
pc=0.9;
pc=0.99;
pc=0.999;
pc=0.9999;
Ad

More Related Content

What's hot (19)

An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Deepti Dohare
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
IJERA Editor
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
IJMER
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
Energy Consumption in Key Management Operations in WSNs
Energy Consumption in Key Management Operations in WSNsEnergy Consumption in Key Management Operations in WSNs
Energy Consumption in Key Management Operations in WSNs
International Journal of Science and Research (IJSR)
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
ER Publication.org
 
O010528791
O010528791O010528791
O010528791
IOSR Journals
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
nooralleema
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
IDES Editor
 
IJET-V3I2P3
IJET-V3I2P3IJET-V3I2P3
IJET-V3I2P3
IJET - International Journal of Engineering and Techniques
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
ijcsta
 
50120140505014
5012014050501450120140505014
50120140505014
IAEME Publication
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 
E010412433
E010412433E010412433
E010412433
IOSR Journals
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Deepti Dohare
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
IJMER
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
sangasandeep
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
eSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
IDES Editor
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
ijcsta
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
Zac Darcy
 

Viewers also liked (20)

Design and simulation of a tunable frequency
Design and simulation of a tunable frequencyDesign and simulation of a tunable frequency
Design and simulation of a tunable frequency
eSAT Publishing House
 
Fault detection and diagnosis ingears using wavelet
Fault detection and diagnosis ingears using waveletFault detection and diagnosis ingears using wavelet
Fault detection and diagnosis ingears using wavelet
eSAT Publishing House
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
eSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
eSAT Publishing House
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
eSAT Publishing House
 
A comparative study on road traffic management systems
A comparative study on road traffic management systemsA comparative study on road traffic management systems
A comparative study on road traffic management systems
eSAT Publishing House
 
Statistical process control
Statistical process controlStatistical process control
Statistical process control
eSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
eSAT Publishing House
 
An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...
eSAT Publishing House
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
eSAT Publishing House
 
Effect of height of triangular siil on the performance of stilling basin model
Effect of height of triangular siil on the performance of stilling basin modelEffect of height of triangular siil on the performance of stilling basin model
Effect of height of triangular siil on the performance of stilling basin model
eSAT Publishing House
 
Growth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp singleGrowth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp single
eSAT Publishing House
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
eSAT Publishing House
 
An analysis of drivers affecting the implementation of
An analysis of drivers affecting the implementation ofAn analysis of drivers affecting the implementation of
An analysis of drivers affecting the implementation of
eSAT Publishing House
 
A comparative study on classification of image segmentation methods with a fo...
A comparative study on classification of image segmentation methods with a fo...A comparative study on classification of image segmentation methods with a fo...
A comparative study on classification of image segmentation methods with a fo...
eSAT Publishing House
 
Joined wing uav maneuverability
Joined wing uav maneuverabilityJoined wing uav maneuverability
Joined wing uav maneuverability
eSAT Publishing House
 
Tank information system of kunigal taluk tumkur district, karanataka using ge...
Tank information system of kunigal taluk tumkur district, karanataka using ge...Tank information system of kunigal taluk tumkur district, karanataka using ge...
Tank information system of kunigal taluk tumkur district, karanataka using ge...
eSAT Publishing House
 
Big data privacy and inconsistency issues
Big data privacy and inconsistency issuesBig data privacy and inconsistency issues
Big data privacy and inconsistency issues
eSAT Publishing House
 
A novel active charge equalisation method for series connected batteries
A novel active charge equalisation method for series connected batteriesA novel active charge equalisation method for series connected batteries
A novel active charge equalisation method for series connected batteries
eSAT Publishing House
 
Design and simulation of a tunable frequency
Design and simulation of a tunable frequencyDesign and simulation of a tunable frequency
Design and simulation of a tunable frequency
eSAT Publishing House
 
Fault detection and diagnosis ingears using wavelet
Fault detection and diagnosis ingears using waveletFault detection and diagnosis ingears using wavelet
Fault detection and diagnosis ingears using wavelet
eSAT Publishing House
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
eSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
eSAT Publishing House
 
Rule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social networkRule based messege filtering and blacklist management for online social network
Rule based messege filtering and blacklist management for online social network
eSAT Publishing House
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
eSAT Publishing House
 
A comparative study on road traffic management systems
A comparative study on road traffic management systemsA comparative study on road traffic management systems
A comparative study on road traffic management systems
eSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
eSAT Publishing House
 
An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...An overview of stress analysis of high energy pipeline systems used in therma...
An overview of stress analysis of high energy pipeline systems used in therma...
eSAT Publishing House
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
eSAT Publishing House
 
Effect of height of triangular siil on the performance of stilling basin model
Effect of height of triangular siil on the performance of stilling basin modelEffect of height of triangular siil on the performance of stilling basin model
Effect of height of triangular siil on the performance of stilling basin model
eSAT Publishing House
 
Growth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp singleGrowth and characterization of cd s doped kdp single
Growth and characterization of cd s doped kdp single
eSAT Publishing House
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
eSAT Publishing House
 
An analysis of drivers affecting the implementation of
An analysis of drivers affecting the implementation ofAn analysis of drivers affecting the implementation of
An analysis of drivers affecting the implementation of
eSAT Publishing House
 
A comparative study on classification of image segmentation methods with a fo...
A comparative study on classification of image segmentation methods with a fo...A comparative study on classification of image segmentation methods with a fo...
A comparative study on classification of image segmentation methods with a fo...
eSAT Publishing House
 
Tank information system of kunigal taluk tumkur district, karanataka using ge...
Tank information system of kunigal taluk tumkur district, karanataka using ge...Tank information system of kunigal taluk tumkur district, karanataka using ge...
Tank information system of kunigal taluk tumkur district, karanataka using ge...
eSAT Publishing House
 
Big data privacy and inconsistency issues
Big data privacy and inconsistency issuesBig data privacy and inconsistency issues
Big data privacy and inconsistency issues
eSAT Publishing House
 
A novel active charge equalisation method for series connected batteries
A novel active charge equalisation method for series connected batteriesA novel active charge equalisation method for series connected batteries
A novel active charge equalisation method for series connected batteries
eSAT Publishing House
 
Ad

Similar to Secure and efficient key pre distribution schemes for wsn using combinatorial design (20)

Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
ijasuc
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSREVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
ijassn
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Editor IJMTER
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A250106
A250106A250106
A250106
inventionjournals
 
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
rahulmonikasharma
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...
eSAT Publishing House
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...
eSAT Publishing House
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
eSAT Publishing House
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation of
eSAT Publishing House
 
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
ijasuc
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKSREVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
Review on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networksReview on key predistribution schemes in wireless sensor networks
Review on key predistribution schemes in wireless sensor networks
ijassn
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Editor IJMTER
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKSSYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
Multilink Routing in Wireless Sensor Networks with Integrated Approach for Hi...
rahulmonikasharma
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
cscpconf
 
Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...Performance of energy balanced territorial predator scent marking algorithm b...
Performance of energy balanced territorial predator scent marking algorithm b...
eSAT Publishing House
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...
eSAT Publishing House
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
eSAT Publishing House
 
Development and performance evaluation of
Development and performance evaluation ofDevelopment and performance evaluation of
Development and performance evaluation of
eSAT Publishing House
 
Ad

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Recently uploaded (20)

PRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Academy - Functional Modeling In Action with PRIZ.pdfPRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Guru
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Dynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptxDynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptx
University of Glasgow
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
MODULE 03 - CLOUD COMPUTING- [BIS 613D] 2022 scheme.pptx
MODULE 03 - CLOUD COMPUTING-  [BIS 613D] 2022 scheme.pptxMODULE 03 - CLOUD COMPUTING-  [BIS 613D] 2022 scheme.pptx
MODULE 03 - CLOUD COMPUTING- [BIS 613D] 2022 scheme.pptx
Alvas Institute of Engineering and technology, Moodabidri
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
ZJIT: Building a Next Generation Ruby JIT
ZJIT: Building a Next Generation Ruby JITZJIT: Building a Next Generation Ruby JIT
ZJIT: Building a Next Generation Ruby JIT
maximechevalierboisv1
 
PRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Academy - Functional Modeling In Action with PRIZ.pdfPRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Academy - Functional Modeling In Action with PRIZ.pdf
PRIZ Guru
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
Dynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptxDynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptx
University of Glasgow
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
ZJIT: Building a Next Generation Ruby JIT
ZJIT: Building a Next Generation Ruby JITZJIT: Building a Next Generation Ruby JIT
ZJIT: Building a Next Generation Ruby JIT
maximechevalierboisv1
 

Secure and efficient key pre distribution schemes for wsn using combinatorial design

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 1 SECURE AND EFFICIENT KEY PRE DISTRIBUTION SCHEMES FOR WSN USING COMBINATORIAL DESIGN IshwaryaMathi Manickavasagam 1 , MadanMohan Anbalagan 2 , Sivasankar Sundaram3 1 Department of ECE, Chennai, India 2 Department of ECE, Chennai, India 3 Department of ECE, Chennai, India Abstract Efficient Key Distribution is essential among sensor nodes. Pairwise and Triple Key Distribution in wireless sensor networks is established using Combinatorial Design. Sensor networks which are used in many applications require secure communication between the nodes. The need for secure communication is to protect the information from unauthorized access and to provide authentication between nodes. In this paper, the combinatorial Design which is used, is followed by Randomized key predistribution are applied to sensor nodes. The algorithm used in this scheme is to improve and increase the connectivity and resilience factor between the nodes. This scheme aims at increasing computation efficiency, communication and security. Keywords—pair wise, triple key distribution, randomized key pre distribution, resilience ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION A WSN is spatially distributed sensors which are used to observe physical or environmental conditions such as sound, pressure and temperature, etc and to pass their information all the way through the network to a main location. The improvement of WSN was aggravated by military applications such as battlefield observation. Today such networks are used in many consumer and industrial applications, such as machine health monitoring, industrial process monitoring and control, etc. The WSN is built of „notes‟ from a few to several hundreds or even thousands, where each node is connected to one or several sensors. Each such sensor network node has typically several parts: a micro controller, a radio transceiver with an internal antenna or connection to an external antenna, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A Sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning „motes‟ of authentic microscopic dimensions have yet to be created. The cost of the sensor node is variable which depends upon the complication of the individual sensor nodes. Depending upon the size and cost on sensor nodes results in corresponding constraints on resources such as memory, energy, communication bandwidth and computational speed. The topology of the WSN can vary from a simple star network to a advanced multi-hop wireless mesh network. The transmission technique between the hops of the network can be routing or flooding. Sensor nodes can be expected as small computers, extremely basic in terms of their interfaces and their components. They usually consist of processing unit with limited computational power and limited memory, sensors or MEMS, a communication device and a power source usually in the form of battery. The connectivity of the network involves two aspects: Local connectivity requires that neighboring nodes either share or there exists a path between them consisting of secure links. Global connectivity requires that there exist a path between any two nodes in the network, consisting of hops with link keys. Sensor nodes can be imagined as small battery powered devices which are deployed in large number to sense abd collect information for various applications ranging from health care to military applications. 2. RELATED WORK Ruj S., Nayak, A. and Stojmenovic, I., proposed the scheme based on selected key distribution and the cost of using this scheme in combinatorial design is very high when compared to other schemes [1]. Camtepe, S.A. and Yener, B., futher extended the idea and developed randomized key distribution scheme. The main disadvantage of using this scheme is that it is not scalable [2]. Khalid S.,Ahmad F., Beg M.A., in this scheme, the nodes are assumed to be deployed based on Trivial Pairwise key distribution and this scheme is scalable and is limited in memory size [3]. Lee, J. and Stinson, D., proposed Single secret key which results in compromise of single nodes
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 2 lead to compromise of all nodes and it is not suitable for large networks [4]. Chakrabarti D., Maitra S and Roy B., nodes are assumed to be deployed based on Randomized block merging which results in terms of loss in connectivity. By using Orthogonal latin square, it is increased in terms of connectivity and resilience factor. This scheme shows a improved link establishment and connectivity graph when compared to other schemes. 3. KEY PRE DISTRIBUTION A good key pre distribution scheme should be resilient to node compromise. There are two ways of distributing the keys to the nodes. One way of pre distribution is to load all the nodes with a single common master key, resulting in an finest storage and full connectivity of the network. However if one node is compromised then the entire network becomes insecure. At the other extreme, each pair of nodes can share a unique key. Initially after deployment of sensor nodes, the key pre distribution is done, where key pre distribution is carried out in three phases. After the deployment of sensor nodes, the keys are distributed to the nodes which are considered, where keys are generated depending upon the algorithm of orthogonal latin squares. Then shared key discovery phase takes place in which the nodes look for common keys in the sensor nodes and the next phase is path key establishment phase in which if there are common keys between two nodes then a path will be established between the nodes. There are three phases for key pre distributions: 3.1 Key Pre Distribution Phase: Prior to the deployment of the sensor network, all nodes obtain a distinct subset of keys, based on the scheme. Every sensor node is equipped with a fixed number of keys randomly chosen from the number of nodes assigned. 3.2 Shared Key Discovery Phase: When two nodes in wireless communication range look for their common keys and if the nodes have common keys then link will be established between the sensor nodes. 3.3 Path Key Establishment Phase: Assigns a path key to selected pairs of sensor nodes in wireless communication range at the end of shared key Discovery phase 4. COMBINATORIAL DESIGN Combinatorial Design provides a fitting balance of key at ease in various sensor nodes. Using this policy maximum number of node pair can communicate directly using pairwise common key. Combinatorial Design consist s of many types and Orthogonal latin square is one of the type, which deals depending upon the matrix. In this paper, we perform the algorithm of Orthogonal Latin Squares based on Combinatorial Design. 4.1 Orthogonal Latin Square In Orthogonal Latin Squares n x n matrix or n matrix can be considered to generate the keys for the assigned sensor nodes. Depending upon the order of the matrix which is considered. The keys are assigned accordingly. Example: 1 1 2 3 2 3 1 3 1 2 In this case, we consider 3x3 matrix and keys are generated as (r,c,s) Where r represents the row and c represents the column and s represents the symbol from the matrix. The keys from the assigned matrix are generated as (1,1,1), (1,1,1), (1,2,2), (1,3,3), (2,1,2), (2,2,3), (2,3,1), (3,1,3), (3,2,1), (3,3,2). Example: 2 When 2 matrixes say L1 & L2 are considered. The keys can be generated as L1= 1 2 3 2 3 1 3 1 2 & L2= 1 2 3 3 1 2 2 3 1 (1,1),(2,2), (3,3), (2,3), (3,1), (1,2), (3,2), (1,3), (2,1) and thus keys are generated. 4.2 Link Establishment The Key Distribution between sensor nodes takes place by assigning key values to the nodes in the sensor network and distributing the keys to the nodes in the network. The sensor node which has a common key will establish a link. In Orthogonal Latin Square based key pre distribution scheme, depending upon the algorithm, the key values are generated and is distributes randomly to all the sensor nodes which is present. The sensor nodes which share a common key will establish a link between the nodes. In this scheme a new approach has been proposed to establish a secure communication between the sensor nodes with desired scalability and resiliency. When two nodes share more than one shared key, the amount of data transferred will be high when compared to one shared key and the bandwidth consumption will also be less when compared to the others.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 3 Flow Chart for Link Establishment using Orthogonal Latin Square Fig: 1 Flow Chart for Link Establishment Fig.1 shows the flow chart for link establishment how keys are established depending upon the algorithm of orthogonal latin squares, if there is common key then link will be established between those nodes and if there is no common keys then it will look again with other nodes for common keys. Fig.2 Link Establishment between sensor nodes Fig.2 shows the graph between the sensor nodes. In this Figure, the number of nodes considered 10 and order of the matrix is 10. Depending upon the algorithm of Orthogonal Latin square, the keys are generated and distributed among the sensor nodes. If there is common key between the nodes, then link will be established. The overlapping of common keys shows that there are more than one common key. If there is more than one common key, the data transferred will be more and bandwidth consumption will be less when compared to the others. 4.3 Connectivity Analysis We have analyzed that presence of our scheme based on connectivity between sensor nodes in the network. For security, we present the probability of the node being compromised. A network node should be able to securely communicate to its local neighbors means a network node physically located within transmission range. Using connectivity theory, we can obtain the necessary expected node degree d (i.e average number of edges connected to each node) for a network of size N, when N is large, in order to achieve a given global connectivity, pc. d = N−1 N [ln N − ln⁡(−ln⁡(pc))] (1) Where N is the number of node, pc gives the probability of connectivity. 0 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 orthogonal latin square approach location of x locationofy 1 2 3 4 5 6 7 8 9 10 34 4 2 23 45 5 3 56 6 67 7 78 8 89 9 910 10 101 1 12 Start Specify number of nodes Assign keys to the node Key Generation using Orthogonal Latin Square Link will not be established between Nodes Establish connection between Nodes Locate Position of the Node on XY Plane Stop Common Keys
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 4 Fig 3 Connectivity Analysis between sensor nodes Fig.3 shows number of node versus degree of node. From the graph we infer that connectivity increases as the number of node increase and hence this scheme is not scalable. When 3 be the number of node considered, for pc value 0.999, we get approximately 18 as degree of node. When 6 be the number of node considered, for pc value 0.9999, we get approximately 18 as degree of node. We have analyzed that presence of our scheme based on connectivity between sensor nodes in the network. For security, we present the probability of the node being compromised. Using connectivity theory, we can obtain the necessary expected node degree d ( i.e average number of edges connected to each node ) for a network of size N, when N is large, in order to achieve a given global connectivity, pc. 5. SIMULATED RESULTS We implement our proposed scheme using MATLAB tool. For Link Establishment between sensor nodes in wireless sensor network we assigned the number of sensor nodes to be 10. Link Establishment between sensor node is based on the algorithm of Orthogonal Latin Square. For connectivity analysis, we simulated the results by assigning the total number of sensor nodes in the network n to be 10, and degree of the node to be 15 and graph is plotted by varying different pc values. 6. CONCLUSIONS From the above simulated results, we conclude that our Orthogonal Latin Square scheme which is carried by randomized key pre distribution has increased probability of connectivity. Our scheme provides security framework provides better resilient. REFERENCES [1] Ruj S., Nayak A. and Stojmenovic I.,(Nov. 2013) „Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications‟, IEEE Trans. On Computers., Vol.62, No.11, pp.2224-2237. [2] Camtepe, S.A. and Yener, B.,(April 2007) „Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks‟, IEEE/ACM Trans. on Networking., Vol.15, No.2, pp.346-358. [3] Khalid S.,Ahmad F., Beg M.A.,(2012), ‘Secure Key Pre-distribution in Wireless Sensor Networks Using Combinatorial Design and Traversal Design Based Key Distribution‟, Vol.No.1, Issue‐4, pp.2248‐9738. [4] Lee, J. and Stinson, D.,(2004) „Deterministic key predistribution schemes for distributed sensor networks‟, SAC, LNCS Vol.No.3357, pp. 294-307. [5] Chakrabarti D., Maitra S .and Roy B.,(March 2006), „ A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design‟, Vol.No.5, pp.105-114. [6] Behrouz A.Forouzan , Debdeep Mukhopadhyay, Cryptography and Network Security,2nd Edition,,Tata Mc Graw Hill Education private edition [7] William Stallings,cryptography and network security principles and practice, Fourth Edition,Pearson Publications ,2006. [8] Ruj, S., Nayak, A. and Stojmenovic, I.,(April 2011) „Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs‟, INFOCOM, 2011 Proceedings IEEE , Vol., No. 10, pp.326-330. [9] C. J. Colbourn and J. H. Dinitz, The CRC Handbook of Combinatorial Designs. CRC Press, 1995. [10] H. Chan, A. Perrig, and D. X. Song, “Random key predistribution schemes for sensor networks,” in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2003, pp. 197–213. [11] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005. 1 2 3 4 5 6 7 8 9 10 5 10 15 20 25 Connectivity no of node Degreeofnode pc=0.9; pc=0.99; pc=0.999; pc=0.9999;