2017
DOI: 10.1109/tifs.2016.2601061
|View full text |Cite
|
Sign up to set email alerts
|

A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite

Abstract: The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 64 publications
(27 citation statements)
references
References 33 publications
(32 reference statements)
0
27
0
Order By: Relevance
“…According to r = 6 the configuration of EG that guarantees the best resilience is p = 18, while in redundant SBIBD p = 31. By using the formula of resilience for EG presented in [20] it is possible to compare these schemes. The comparison is shown in Figure 5.…”
Section: Experimental Analysismentioning
confidence: 99%
“…According to r = 6 the configuration of EG that guarantees the best resilience is p = 18, while in redundant SBIBD p = 31. By using the formula of resilience for EG presented in [20] it is possible to compare these schemes. The comparison is shown in Figure 5.…”
Section: Experimental Analysismentioning
confidence: 99%
“…The size of the key pool, key connectivity, and key ring size play a very important role in deciding the performance of this scheme. A deployment‐based schemes was given in Du et al in which prior deployment information is utilized to distribute the keys among the sensor nodes by Du et al A q‐s composite scheme is discussed in Gandino et al to improve the security of KMS. Choi et al uses grid‐based location to design KMS.…”
Section: Background Studymentioning
confidence: 99%
“…The value of l is taken from the set. [2][3][4][5][6][7][8][9][10] The key connectivity is taken from set [0.3,0.5]. It decreases with increase in number of captured nodes.…”
Section: Resilience Against Node Capturementioning
confidence: 99%
“…In [24], the authors propose q-s-Composite, a further evolution of EG and q-composite. In this scheme there are a minimum (q) and a maximum (s) quantity of initial keys used to establishment a pairwise key.…”
Section: Random Key Distributionmentioning
confidence: 99%
“…A new organization of the storage allows to increase the quantity of initial keys per node with the same memory overhead. According to the analysis proposed in [24], q is set to 1 and s to 5. In the following, the q-s-Composite is called 1-5C.…”
Section: Random Key Distributionmentioning
confidence: 99%