Vijay Bulusu, Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi

نویسندگان

  • Vijay Bulusu
  • Arjan Durresi
  • Vamsi Paruchuri
  • Mimoza Durresi
  • Raj Jain
چکیده

Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or limited mobility. In this paper we present two key predistribution based scheme for heterogeneous networks i.e. networks which consist of nodes which are stationary as well as highly mobile. The existing schemes make use of only one key pool to establish links between the staionary and the mobile nodes. This restricts the mobility of nodes to one specific network. If the same key pool is used in multiple networks, the compromise of keys in one network would lead to compromise of keys in all the networks. We present two different solutions to this problem. The first approach uses a separate disjoint key pool to establish links between the stationary and mobile nodes of the network. In the second approach we take a large key pool and segment it into smaller key pools. Each of these segments acts as the key pool for different stationary sensor networks. The mobile nodes get keys from the aggregate of all these segments. The aggregate key pool can have some segments which can be used for future deployments. We compare the two schemes and analyze their performance. The schemes only deal with secure key distribution between the mobile and stationary nodes. It is assumed that the stationary nodes of the sensor networks are securely connected.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks

Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present a set of protocols for anonymous routing to prevent loca...

متن کامل

Efficient And Secure Autonomous System Based Traceback

ARJAN DURRESI,VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, S.S IYENGAR Department of Computer Science, Louisiana State University 298 Coates Hall, Baton Rouge, LA 70803, USA Email:{durresi, paruchuri, rkannan, iyengar}@csc.lsu.edu Department of Information and Communication Engineering Faculty of Information Engineering, Fukuoka Institute of Technology (FIT) 3-30-1 Wajiro-Higashi, Higashi...

متن کامل

A scalable anonymous protocol for heterogeneous wireless ad hoc networks

Ensuring anonymity in wireless and hoc networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel Scalable Anonymous Protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversar...

متن کامل

A Hierarchical Anonymous Communication Protocol for Sensor Networks

Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...

متن کامل

Key Distribution in Mobile Heterogeneous Sensor Networks

Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or limited mobility. In this paper we present two key predistribution based scheme for heterogeneous networks i.e. networks which consist of nodes which are stationary as well as highly mobile. The existing schemes make use of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006