Key establishment in sensor networks based on triangle grid deployment model

Yun Zhou, Yanchao Zhang, Yuguang Fang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

Key establishment between neighboring nodes is a fundamental issue for securing sensor networks deployed in unattended and hostile environments. Recent research ofien assumed a probabilistic approach by pre-distributing a random set of secrets to each node such that any two neighboring nodes can establish a direct key with a certain probability or negotiate an indirect key through multi-hop routing after deployment. The shortcomings include poor resilience against node compromise, low secure connectivity, etc. In this paper, we present a key establishment scheme based on a triangle grid deployment model. In contrast to previous proposals, our scheme have higher resilience to node compromise attacks with much smaller memory costs, while maintaining high secure connectivity so that much less energy needs to be consumed in establishing indirect keys through multi-hop or multi-path routing.

Original languageEnglish (US)
Title of host publicationMILCOM 2005
Subtitle of host publicationMilitary Communications Conference 2005
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1450-1455
Number of pages6
ISBN (Print)0780393937, 9780780393936
DOIs
StatePublished - 2005
Externally publishedYes
EventMILCOM 2005: Military Communications Conference 2005 - Atlatnic City, NJ, United States
Duration: Oct 17 2005Oct 20 2005

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2005

Other

OtherMILCOM 2005: Military Communications Conference 2005
CountryUnited States
CityAtlatnic City, NJ
Period10/17/0510/20/05

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Key establishment in sensor networks based on triangle grid deployment model'. Together they form a unique fingerprint.

Cite this