SlideShare a Scribd company logo
Modeling the Pairwise Key Predistribution Scheme
in the Presence of Unreliable Links
ABSTRACT:
We investigate the secure connectivity of wireless sensor networks under the
random pairwise key predistribution scheme of Chan, Perrig, and Song. Unlike
recent work carried out under the assumption of full visibility, here we assume a
(simplified) communication model where unreliable wireless links are represented
as independent on/off channels.We present conditions on how to scale the model
parameters so that the network 1) has no secure node that is isolated and 2) is
securely connected, both with high probability, when the number of sensor nodes
becomes large. The results are given in the form of zero-one laws, and exhibit
significant differences with corresponding results in the full-visibility case.
Through simulations, these zero-one laws are shown to also hold under a more
realistic communication model, namely the disk model.
EXISTING SYSTEM:
Many security schemes developed for general network environments do not take
into account the unique features of WSNs: Public key cryptography is not feasible
computationally because of the severe limitations imposed on the physical memory
and power consumption of the individual sensors. Traditional key exchange and
distribution protocols are based on trusting third parties, and this makes them
inadequate for large-scale WSNs whose topologies are unknown prior to
deployment. Random key predistribution schemes were introduced to address some
of these difficulties. The idea of randomly assigning secure keys to sensor nodes
prior to network deployment was first introduced by Eschenauer and Gligor. The
approach we use here considers random graph models naturally induced by a given
scheme, and then develops models naturally induced by a given scheme, and then
develops the scaling laws corresponding to desirable network properties, e.g.,
absence of secure nodes that are isolated, secure connectivity, etc. This is done
with the aim of deriving guidelines to dimension the scheme, namely adjust its
parameters so that these properties occur.
DISADVANTAGES OF EXISTING SYSTEM:
To be sure, the full-visibility assumption does away with the wireless nature of the
communication medium supporting WSNs. In return, this simplification makes it
possible to focus on how randomization in the key assignments alone affects the
establishment of a secure network in the best of circumstances, i.e., when there are
no link failures. A common criticism of this line of work is that by disregarding the
unreliability of the wireless links, the resulting dimensioning guidelines are likely
to be too optimistic: In practice, nodes will have fewer neighbors since some of the
communication links may be impaired. As a result, the desired connectivity
properties may not be achieved if dimensioning is done according to results
derived under full visibility.
PROPOSED SYSTEM:
In this paper, in an attempt to go beyond full visibility, we revisit the pairwise key
predistribution scheme of Chan et al. under more realistic assumptions that account
for the possibility that communication links between nodes may not be available.
This could occur due to the presence of physical barriers between nodes or because
of harsh environmental conditions severely impairing transmission. To study such
situations, we introduce a simple communication model where channels are
mutually independent, and are either on or off. An overall system model is then
constructed by intersecting the random graph model of the pairwise key
distribution scheme (under full visibility).
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Osman Yağan, Member, IEEE, and Armand M. Makowski, Fellow, IEEE
“Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable
Links”-IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO.
3, MARCH 2013.

More Related Content

What's hot (14)

PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
ijasuc
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
 
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 
DOCX
Secure data aggregation technique for wireless
jpstudcorner
 
PDF
Reliability in wsn for security
Swamy Vivekananda
 
DOCX
A spectral clustering approach to identifying cuts in wireless sensor networks
Nexgen Technology
 
PDF
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET Journal
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
PPTX
Secure routing for wireless NANs
Reza Sadeghi
 
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
ijasuc
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure data aggregation technique for wireless sensor networks in the presenc...
LogicMindtech Nologies
 
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 
Secure data aggregation technique for wireless
jpstudcorner
 
Reliability in wsn for security
Swamy Vivekananda
 
A spectral clustering approach to identifying cuts in wireless sensor networks
Nexgen Technology
 
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET Journal
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure routing for wireless NANs
Reza Sadeghi
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 

Viewers also liked (14)

DOCX
Face to-face proximity estimation using bluetooth on smartphones
JPINFOTECH JAYAPRAKASH
 
DOCX
Moses supporting and enforcing security profiles on smartphones
JPINFOTECH JAYAPRAKASH
 
DOCX
Opportunistic manets mobility can make up for low transmission power
JPINFOTECH JAYAPRAKASH
 
DOCX
A proxy based approach to continuous location-based spatial queries in mobile...
JPINFOTECH JAYAPRAKASH
 
DOCX
Dynamic personalized recommendation on sparse data
JPINFOTECH JAYAPRAKASH
 
DOCX
Alert an anonymous location based efficient routing protocol in mane ts
JPINFOTECH JAYAPRAKASH
 
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
JPINFOTECH JAYAPRAKASH
 
DOCX
Relay selection for geographical forwarding in sleep wake cycling wireless se...
JPINFOTECH JAYAPRAKASH
 
DOCX
Crowdsourced trace similarity with smartphones
JPINFOTECH JAYAPRAKASH
 
DOCX
Adaptive position update for geographic routing in mobile ad hoc networks
JPINFOTECH JAYAPRAKASH
 
DOCX
Eaack—a secure intrusion detection system for manets
JPINFOTECH JAYAPRAKASH
 
PDF
2013 IEEE PROJECT TITLES FOR CSE
JPINFOTECH JAYAPRAKASH
 
DOCX
Error tolerant resource allocation and payment minimization for cloud system
JPINFOTECH JAYAPRAKASH
 
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
Face to-face proximity estimation using bluetooth on smartphones
JPINFOTECH JAYAPRAKASH
 
Moses supporting and enforcing security profiles on smartphones
JPINFOTECH JAYAPRAKASH
 
Opportunistic manets mobility can make up for low transmission power
JPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
JPINFOTECH JAYAPRAKASH
 
Dynamic personalized recommendation on sparse data
JPINFOTECH JAYAPRAKASH
 
Alert an anonymous location based efficient routing protocol in mane ts
JPINFOTECH JAYAPRAKASH
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
JPINFOTECH JAYAPRAKASH
 
Relay selection for geographical forwarding in sleep wake cycling wireless se...
JPINFOTECH JAYAPRAKASH
 
Crowdsourced trace similarity with smartphones
JPINFOTECH JAYAPRAKASH
 
Adaptive position update for geographic routing in mobile ad hoc networks
JPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
JPINFOTECH JAYAPRAKASH
 
2013 IEEE PROJECT TITLES FOR CSE
JPINFOTECH JAYAPRAKASH
 
Error tolerant resource allocation and payment minimization for cloud system
JPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
Ad

Similar to Modeling the pairwise key predistribution scheme in the presence of unreliable links (20)

PPTX
Modelling pairwise key predistribution in the presence of unreliable links
Saikiran Gvs
 
PDF
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
IRJET Journal
 
PDF
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
PDF
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
PDF
Review on key predistribution schemes in wireless sensor networks
ijassn
 
PDF
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
PDF
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
IJNSA Journal
 
PDF
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Deepti Dohare
 
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
ijceronline
 
PDF
Ijcnc050210
IJCNCJournal
 
PDF
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ijceronline
 
PDF
Secure and efficient key pre distribution schemes for wsn using combinatorial...
eSAT Publishing House
 
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
PDF
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
cscpconf
 
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 
PDF
Secure multipath routing scheme using key
ijfcstjournal
 
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
PDF
A survey on wireless sensor networks security with the integration of cluster...
csandit
 
PDF
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
cscpconf
 
Modelling pairwise key predistribution in the presence of unreliable links
Saikiran Gvs
 
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
IRJET Journal
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
Review on key predistribution schemes in wireless sensor networks
ijassn
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
IJNSA Journal
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Deepti Dohare
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
ijceronline
 
Ijcnc050210
IJCNCJournal
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ijceronline
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
eSAT Publishing House
 
A highly scalable key pre distribution scheme for wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
cscpconf
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 
Secure multipath routing scheme using key
ijfcstjournal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
A survey on wireless sensor networks security with the integration of cluster...
csandit
 
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
cscpconf
 
Ad

Recently uploaded (20)

PPTX
Controller Request and Response in Odoo18
Celine George
 
PDF
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
PPTX
DAY 1_QUARTER1 ENGLISH 5 WEEK- PRESENTATION.pptx
BanyMacalintal
 
PPTX
How to Manage Expiry Date in Odoo 18 Inventory
Celine George
 
PDF
Vani - The Voice of Excellence - Jul 2025 issue
Savipriya Raghavendra
 
PPTX
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
PPTX
Different types of inheritance in odoo 18
Celine George
 
PDF
epi editorial commitee meeting presentation
MIPLM
 
PDF
Council of Chalcedon Re-Examined
Smiling Lungs
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PPTX
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
PDF
AI-assisted IP-Design lecture from the MIPLM 2025
MIPLM
 
PDF
STATEMENT-BY-THE-HON.-MINISTER-FOR-HEALTH-ON-THE-COVID-19-OUTBREAK-AT-UG_revi...
nservice241
 
PPTX
SD_GMRC5_Session 6AB_Dulog Pedagohikal at Pagtataya (1).pptx
NickeyArguelles
 
PDF
Week 2 - Irish Natural Heritage Powerpoint.pdf
swainealan
 
PDF
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
PDF
Is Assignment Help Legal in Australia_.pdf
thomas19williams83
 
PPTX
Introduction to Biochemistry & Cellular Foundations.pptx
marvinnbustamante1
 
PDF
IMPORTANT GUIDELINES FOR M.Sc.ZOOLOGY DISSERTATION
raviralanaresh2
 
PPTX
care of patient with elimination needs.pptx
Rekhanjali Gupta
 
Controller Request and Response in Odoo18
Celine George
 
Lean IP - Lecture by Dr Oliver Baldus at the MIPLM 2025
MIPLM
 
DAY 1_QUARTER1 ENGLISH 5 WEEK- PRESENTATION.pptx
BanyMacalintal
 
How to Manage Expiry Date in Odoo 18 Inventory
Celine George
 
Vani - The Voice of Excellence - Jul 2025 issue
Savipriya Raghavendra
 
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
Different types of inheritance in odoo 18
Celine George
 
epi editorial commitee meeting presentation
MIPLM
 
Council of Chalcedon Re-Examined
Smiling Lungs
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
EDUCATIONAL MEDIA/ TEACHING AUDIO VISUAL AIDS
Sonali Gupta
 
AI-assisted IP-Design lecture from the MIPLM 2025
MIPLM
 
STATEMENT-BY-THE-HON.-MINISTER-FOR-HEALTH-ON-THE-COVID-19-OUTBREAK-AT-UG_revi...
nservice241
 
SD_GMRC5_Session 6AB_Dulog Pedagohikal at Pagtataya (1).pptx
NickeyArguelles
 
Week 2 - Irish Natural Heritage Powerpoint.pdf
swainealan
 
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
Is Assignment Help Legal in Australia_.pdf
thomas19williams83
 
Introduction to Biochemistry & Cellular Foundations.pptx
marvinnbustamante1
 
IMPORTANT GUIDELINES FOR M.Sc.ZOOLOGY DISSERTATION
raviralanaresh2
 
care of patient with elimination needs.pptx
Rekhanjali Gupta
 

Modeling the pairwise key predistribution scheme in the presence of unreliable links

  • 1. Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links ABSTRACT: We investigate the secure connectivity of wireless sensor networks under the random pairwise key predistribution scheme of Chan, Perrig, and Song. Unlike recent work carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as independent on/off channels.We present conditions on how to scale the model parameters so that the network 1) has no secure node that is isolated and 2) is securely connected, both with high probability, when the number of sensor nodes becomes large. The results are given in the form of zero-one laws, and exhibit significant differences with corresponding results in the full-visibility case. Through simulations, these zero-one laws are shown to also hold under a more realistic communication model, namely the disk model. EXISTING SYSTEM: Many security schemes developed for general network environments do not take into account the unique features of WSNs: Public key cryptography is not feasible computationally because of the severe limitations imposed on the physical memory
  • 2. and power consumption of the individual sensors. Traditional key exchange and distribution protocols are based on trusting third parties, and this makes them inadequate for large-scale WSNs whose topologies are unknown prior to deployment. Random key predistribution schemes were introduced to address some of these difficulties. The idea of randomly assigning secure keys to sensor nodes prior to network deployment was first introduced by Eschenauer and Gligor. The approach we use here considers random graph models naturally induced by a given scheme, and then develops models naturally induced by a given scheme, and then develops the scaling laws corresponding to desirable network properties, e.g., absence of secure nodes that are isolated, secure connectivity, etc. This is done with the aim of deriving guidelines to dimension the scheme, namely adjust its parameters so that these properties occur. DISADVANTAGES OF EXISTING SYSTEM: To be sure, the full-visibility assumption does away with the wireless nature of the communication medium supporting WSNs. In return, this simplification makes it possible to focus on how randomization in the key assignments alone affects the establishment of a secure network in the best of circumstances, i.e., when there are no link failures. A common criticism of this line of work is that by disregarding the unreliability of the wireless links, the resulting dimensioning guidelines are likely to be too optimistic: In practice, nodes will have fewer neighbors since some of the
  • 3. communication links may be impaired. As a result, the desired connectivity properties may not be achieved if dimensioning is done according to results derived under full visibility. PROPOSED SYSTEM: In this paper, in an attempt to go beyond full visibility, we revisit the pairwise key predistribution scheme of Chan et al. under more realistic assumptions that account for the possibility that communication links between nodes may not be available. This could occur due to the presence of physical barriers between nodes or because of harsh environmental conditions severely impairing transmission. To study such situations, we introduce a simple communication model where channels are mutually independent, and are either on or off. An overall system model is then constructed by intersecting the random graph model of the pairwise key distribution scheme (under full visibility).
  • 4. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.
  • 5. REFERENCE: Osman Yağan, Member, IEEE, and Armand M. Makowski, Fellow, IEEE “Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links”-IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013.