4.5 Article

Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Predistribution Scheme With Unreliable Links

期刊

IEEE-ACM TRANSACTIONS ON NETWORKING
卷 25, 期 3, 页码 1789-1802

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2017.2653109

关键词

Security; key predistribution; wireless sensor networks; random graphs; topological properties

资金

  1. Arizona State University
  2. U.S. National Science Foundation [CNS-1422277]
  3. U.S. Defense Threat Reduction Agency [HDTRA1-13-1-0029]
  4. Cybersecurity Lab (CyLab) at Carnegie Mellon University
  5. Department of Electrical and Computer Engineering at Carnegie Mellon University

向作者/读者索取更多资源

Security is an important issue in wireless sensor networks (WSNs), which are often deployed in hostile environments. The q-composite key predistribution scheme has been recognized as a suitable approach to secure WSNs. Although the q-composite scheme has received much attention in the literature, there is still a lack of rigorous analysis for secure WSNs operating under the q-composite scheme in consideration of the unreliability of links. One main difficulty lies in analyzing the network topology, whose links are not independent. Wireless links can be unreliable in practice due to the presence of physical barriers between sensors or because of harsh environmental conditions severely impairing communications. In this paper, we resolve the difficult challenge and investigate topological properties related to node degree in WSNs operating under the q-composite scheme with unreliable communication links modeled as independent ON/OFF channels. Specifically, we derive the asymptotically exact probability for the property of minimum degree being at least k, present the asymptotic probability distribution for the minimum degree, and demonstrate that the number of nodes with a fixed degree is in distribution asymptotically equivalent to a Poisson random variable. We further use the theoretical results to provide useful design guidelines for secure WSNs. Experimental results also confirm the validity of our analytical findings.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据