2015
DOI: 10.1007/s10623-015-0124-0
|View full text |Cite
|
Sign up to set email alerts
|

Graph-theoretic design and analysis of key predistribution schemes

Abstract: Key predistribution schemes for resource-constrained networks are methods for allocating symmetric keys to devices in such a way as to provide an efficient trade-off between key storage, connectivity and resilience. While there have been many suggested constructions for key predistribution schemes, a general understanding of the design principles on which to base such constructions is somewhat lacking. Indeed even the tools from which to develop such an understanding are currently limited, which results in man… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…Constructions of appropriate designs that form the foundations of combinatorial KPS are well briefed in [5,6,18,20,23,25,26]. Stinson's book [27] elaborately presents the construction of several combinatorial designs with concrete analyses.…”
Section: Key Predistribution Schemes (Kpss)mentioning
confidence: 99%
See 3 more Smart Citations
“…Constructions of appropriate designs that form the foundations of combinatorial KPS are well briefed in [5,6,18,20,23,25,26]. Stinson's book [27] elaborately presents the construction of several combinatorial designs with concrete analyses.…”
Section: Key Predistribution Schemes (Kpss)mentioning
confidence: 99%
“…Several works [5, 7, 18] demonstrate that deterministic schemes have provable desirable properties over their random counterparts. This leads to proposals of numerous efficient DKPSs [5, 6, 8, 9, 23] using combinatorial tricks. Bag et al [24] and Kendall and Martin [23] laid down the necessary criteria for DKPS in a distributed environment; while Sarkar [19] hints at desirable features of combinatorial hierarchical subset construction.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We then define the random intersection graph G(n, m, p) with vertex set V and vertices v i , v j ∈ V adjacent if and only if there exists some w ∈ W such that both v i and v j are adjacent to w in B(n, m, p). Several variant models of random intersection graphs have been proposed, and many graph-theoretic properties of G(n, m, p), such as degree distribution, connected components, fixed subgraphs, independence number, clique number, diameter, Hamiltonicity and clustering, have been extensively studied [8,9,[11][12][13][14]. We refer the reader to References [15,16] for an updated review of recent results in this prolific field.…”
Section: Introductionmentioning
confidence: 99%