Key establishment in sensor networks based on triangle grid deployment model

Yun Zhou, Yanchao Zhang, Yuguang Fang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and hostile environments. Recent research ofien assumed a probabilistic approach by pre-distributing a random set of secrets to each node such that any two neighboring nodes can establish a direct key with a certain probability or negotiate an indirect key through multi-hop routing after deployment. The shortcomings include poor resilience against node compromise, low secure connectivity, etc. In this paper, we present a key establishment scheme based on a triangle grid deployment model. In contrast to previous proposals, our scheme have higher resilience to node compromise attacks with much smaller memory costs, while maintaining high secure connectivity so that much less energy needs to be consumed in establishing indirect keys through multi-hop or multi-path routing.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE Military Communications Conference MILCOM
Volume2005
DOIs
StatePublished - 2005
Externally publishedYes
EventMILCOM 2005: Military Communications Conference 2005 - Atlatnic City, NJ, United States
Duration: Oct 17 2005Oct 20 2005

Other

OtherMILCOM 2005: Military Communications Conference 2005
CountryUnited States
CityAtlatnic City, NJ
Period10/17/0510/20/05

Fingerprint

Sensor networks
Data storage equipment
Costs

ASJC Scopus subject areas

  • Civil and Structural Engineering
  • Electrical and Electronic Engineering

Cite this

Zhou, Y., Zhang, Y., & Fang, Y. (2005). Key establishment in sensor networks based on triangle grid deployment model. In Proceedings - IEEE Military Communications Conference MILCOM (Vol. 2005). [1605881] https://doi.org/10.1109/MILCOM.2005.1605881

Key establishment in sensor networks based on triangle grid deployment model. / Zhou, Yun; Zhang, Yanchao; Fang, Yuguang.

Proceedings - IEEE Military Communications Conference MILCOM. Vol. 2005 2005. 1605881.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zhou, Y, Zhang, Y & Fang, Y 2005, Key establishment in sensor networks based on triangle grid deployment model. in Proceedings - IEEE Military Communications Conference MILCOM. vol. 2005, 1605881, MILCOM 2005: Military Communications Conference 2005, Atlatnic City, NJ, United States, 10/17/05. https://doi.org/10.1109/MILCOM.2005.1605881
Zhou Y, Zhang Y, Fang Y. Key establishment in sensor networks based on triangle grid deployment model. In Proceedings - IEEE Military Communications Conference MILCOM. Vol. 2005. 2005. 1605881 https://doi.org/10.1109/MILCOM.2005.1605881
Zhou, Yun ; Zhang, Yanchao ; Fang, Yuguang. / Key establishment in sensor networks based on triangle grid deployment model. Proceedings - IEEE Military Communications Conference MILCOM. Vol. 2005 2005.
@inproceedings{d66c9384275e40038881f25f224234a6,
title = "Key establishment in sensor networks based on triangle grid deployment model",
abstract = "Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and hostile environments. Recent research ofien assumed a probabilistic approach by pre-distributing a random set of secrets to each node such that any two neighboring nodes can establish a direct key with a certain probability or negotiate an indirect key through multi-hop routing after deployment. The shortcomings include poor resilience against node compromise, low secure connectivity, etc. In this paper, we present a key establishment scheme based on a triangle grid deployment model. In contrast to previous proposals, our scheme have higher resilience to node compromise attacks with much smaller memory costs, while maintaining high secure connectivity so that much less energy needs to be consumed in establishing indirect keys through multi-hop or multi-path routing.",
author = "Yun Zhou and Yanchao Zhang and Yuguang Fang",
year = "2005",
doi = "10.1109/MILCOM.2005.1605881",
language = "English (US)",
isbn = "0780393937",
volume = "2005",
booktitle = "Proceedings - IEEE Military Communications Conference MILCOM",

}

TY - GEN

T1 - Key establishment in sensor networks based on triangle grid deployment model

AU - Zhou, Yun

AU - Zhang, Yanchao

AU - Fang, Yuguang

PY - 2005

Y1 - 2005

N2 - Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and hostile environments. Recent research ofien assumed a probabilistic approach by pre-distributing a random set of secrets to each node such that any two neighboring nodes can establish a direct key with a certain probability or negotiate an indirect key through multi-hop routing after deployment. The shortcomings include poor resilience against node compromise, low secure connectivity, etc. In this paper, we present a key establishment scheme based on a triangle grid deployment model. In contrast to previous proposals, our scheme have higher resilience to node compromise attacks with much smaller memory costs, while maintaining high secure connectivity so that much less energy needs to be consumed in establishing indirect keys through multi-hop or multi-path routing.

AB - Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and hostile environments. Recent research ofien assumed a probabilistic approach by pre-distributing a random set of secrets to each node such that any two neighboring nodes can establish a direct key with a certain probability or negotiate an indirect key through multi-hop routing after deployment. The shortcomings include poor resilience against node compromise, low secure connectivity, etc. In this paper, we present a key establishment scheme based on a triangle grid deployment model. In contrast to previous proposals, our scheme have higher resilience to node compromise attacks with much smaller memory costs, while maintaining high secure connectivity so that much less energy needs to be consumed in establishing indirect keys through multi-hop or multi-path routing.

UR - http://www.scopus.com/inward/record.url?scp=33847342853&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33847342853&partnerID=8YFLogxK

U2 - 10.1109/MILCOM.2005.1605881

DO - 10.1109/MILCOM.2005.1605881

M3 - Conference contribution

SN - 0780393937

SN - 9780780393936

VL - 2005

BT - Proceedings - IEEE Military Communications Conference MILCOM

ER -