Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment

Chia Mu Yu, Cheng Chung Li, Chun Shien Lu*, Der Tsai Lee, Sy Yen Kuo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Secure communication is a challenging problem in wireless sensor networks. In this paper, we investigate an attack probability-based deterministic key predistribution method for non-uniform sensor deployment. First, we design a reasonable model for group-based deployment to estimate the attack probability of each deployment group. Second, our proposed model further considers the location of data sink to meet the practical situation. Third, based on this attack model, a deterministic key predistribution mechanism is presented for group-based deployment. The proposed method mainly aims at preserving the integrity of network so that the functionality of each sensor node can be used. To evaluate the proposed method, the issues of memory overhead, communication overhead, and the fraction of total communications compromised after adversaries launch node capture attacks are studied analytically and numerically.

Original languageEnglish
Title of host publication27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07
DOIs
StatePublished - 2007
Event27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07 - Toronto, ON, Canada
Duration: 22 Jun 200729 Jun 2007

Publication series

NameProceedings - International Conference on Distributed Computing Systems

Conference

Conference27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07
CountryCanada
CityToronto, ON
Period22/06/0729/06/07

Keywords

  • Attack probability
  • Deployment
  • Key pre-distribution
  • Security
  • Sensor network

Fingerprint Dive into the research topics of 'Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment'. Together they form a unique fingerprint.

  • Cite this

    Yu, C. M., Li, C. C., Lu, C. S., Lee, D. T., & Kuo, S. Y. (2007). Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment. In 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07 [4279012] (Proceedings - International Conference on Distributed Computing Systems). https://doi.org/10.1109/ICDCSW.2007.24