Vijay Bulusu, Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi
نویسندگان
چکیده
Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or limited mobility. In this paper we present two key predistribution based scheme for heterogeneous networks i.e. networks which consist of nodes which are stationary as well as highly mobile. The existing schemes make use of only one key pool to establish links between the staionary and the mobile nodes. This restricts the mobility of nodes to one specific network. If the same key pool is used in multiple networks, the compromise of keys in one network would lead to compromise of keys in all the networks. We present two different solutions to this problem. The first approach uses a separate disjoint key pool to establish links between the stationary and mobile nodes of the network. In the second approach we take a large key pool and segment it into smaller key pools. Each of these segments acts as the key pool for different stationary sensor networks. The mobile nodes get keys from the aggregate of all these segments. The aggregate key pool can have some segments which can be used for future deployments. We compare the two schemes and analyze their performance. The schemes only deal with secure key distribution between the mobile and stationary nodes. It is assumed that the stationary nodes of the sensor networks are securely connected.
منابع مشابه
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capability. Location information of nodes can be critical in wireless ad hoc networks, especially in those deployed for military purposes. In this paper, we present a set of protocols for anonymous routing to prevent loca...
متن کاملEfficient And Secure Autonomous System Based Traceback
ARJAN DURRESI,VAMSI PARUCHURI, LEONARD BAROLLI, RAJGOPAL KANNAN, S.S IYENGAR Department of Computer Science, Louisiana State University 298 Coates Hall, Baton Rouge, LA 70803, USA Email:{durresi, paruchuri, rkannan, iyengar}@csc.lsu.edu Department of Information and Communication Engineering Faculty of Information Engineering, Fukuoka Institute of Technology (FIT) 3-30-1 Wajiro-Higashi, Higashi...
متن کاملA scalable anonymous protocol for heterogeneous wireless ad hoc networks
Ensuring anonymity in wireless and hoc networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel Scalable Anonymous Protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping adversar...
متن کاملA Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to event locations/active areas. In this paper we present a novel hierarchical anonymous communication protocol that hides the location of nodes and obscure the correlation between event zones and data flow from snooping ...
متن کاملKey Distribution in Mobile Heterogeneous Sensor Networks
Key predistribution is a popular technique for key distribution in sensor networks. The schemes available in current literature using this approach are for nodes with no or limited mobility. In this paper we present two key predistribution based scheme for heterogeneous networks i.e. networks which consist of nodes which are stationary as well as highly mobile. The existing schemes make use of ...
متن کامل