5 research outputs found

    Simple and flexible random key pre-distribution schemes for wireless sensor networks using deployment knowledge

    Get PDF
    Sensor nodes are tiny, low-power and battery constrained electromechanical devices that are usually deployed for sensing some type of data in different types of areas. Because of their memory and computational restrictions, public key cryptography (PKC) systems are not suited for sensor nodes to provide security. Instead, private key cryptography is preferred to be used with sensor networks and there has been considerable work in this area, but there still exist problems with private key cryptography because of memory restrictions of sensor nodes. Number of keys that can be deployed into a sensor node is determined by the available memory of that node which is limited even private key cryptographic techniques are applied. So, new key distribution mechanisms are required to decrease number of pairwise keys that are deployed into a sensor node. Random key pre-distribution mechanisms have been proposed to overcome memory restrictions of sensor nodes. These mechanisms are widely accepted for sensor network security. Simply, these schemes try do decrease the number of keys to be deployed in each sensor node in a sensor network and provide reasonable security for the sensor network. Random key pre-distribution schemes proposed until now have some deficiencies. Some of these schemes are too complicated and too difficult to be applied. Schemes that seem deployable involve unrealistic assumptions when real world scenarios are considered. In this thesis, we propose random key pre-distribution mechanisms that are simple and easily deployable. In this thesis, we first developed a generalized random key pre-distribution scheme. Then we proposed three random key pre-distribution mechanisms based on this generalized scheme and we provided their simulation results and their comparison to well-known random key pre-distribution schemes in the literature. Our generalized scheme allows different systems to be derived according to deployment needs. It offers simple, easily deployable distribution mechanisms and provides reasonable connectivity and resiliency with respect to its simplicity

    Distribution games: a new class of games with application to user provided networks

    Get PDF
    User Provided Network (UPN) is a promising solution for sharing the limited network resources by utilizing user capabilities as a part of the communication infrastructure. In UPNs, it is an important problem to decide how to share the resources among multiple clients in decentralized manner. Motivated by this problem, we introduce a new class of games termed distribution games that can be used to distribute efficiently and fairly the bandwidth capacity among users. We show that every distribution game has at least one pure strategy Nash equilibrium (NE) and any best response dynamics always converges to such an equilibrium. We consider social welfare functions that are weighted sums of bandwidths allocated to clients. We present tight upper bounds for the price of anarchy and price of stability of these games provided that they satisfy some reasonable assumptions. We define two specific practical instances of distribution games that fit these assumptions. We conduct experiments on one of these instances and demonstrate that in most of the settings the social welfare obtained by the best response dynamics is very close to the optimum. Simulations show that this game also leads to a fair distribution of the bandwidth.Publisher's Versio

    Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools

    Get PDF
    Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical devices. A sensor node contains a sensing unit and a wireless communication unit. Sensor nodes are deployed over a field for sensing an event data in the environment and transfer it towards a base station over its wireless channel. In a typical application, vast amount of sensor nodes are deployed over a field which constitute a sensor network. Sensor nodes must be customized for a specific sensor network application before the deployment. This customization is needed not only for underlying networking application, but also for security related configurations. Random key predistribution mechanisms have been proposed to provide security for wireless sensor networks. In the literature, there are well known random key predistribution schemes. Some of these schemes are secure, but quite complex to apply in real-world applications due to their node-based customization requirements, while some other are easily applicable but they do not offer reasonable security. In this paper, we propose random key predistribution schemes for wireless sensor networks that provide varying ranges of security. The proposed schemes are easily applicable in real world scenarios due to their simplicity and relaxed node customization requirements. In this respect, our schemes provide a tradeoff. Moreover, our proposed schemes show a good extensibility property. We assume prior deployment knowledge. We examine performance of our schemes and compare them with well known random key predistribution schemes

    Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge

    No full text
    Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical devices that are usually deployed for sensing some type of data in the field. Random key predistribution mechanisms have been proposed to provide security for wireless sensor networks. In the literature, there are well known random key predistribution schemes. Some of these schemes are secure, but quite complex to apply, while some other are easily applicable but they do not offer reasonable security. In this paper, we propose random key predistribution schemes for wireless sensor networks that provide varying ranges of security and that are easily applicable due to their simplicity. In this respect, our schemes serve as a tradeoff. Moreover, our proposed schemes show a good extensibility property. We assume prior deployment knowledge. We examine performance of our schemes and compare them with well known random key predistribution schemes

    SeFER: secure, flexible and efficient routing protocol for distributed sensor networks

    No full text
    In this paper, we present a secure, flexible, and efficient routing protocol for sensor networks based on random key pre-distribution. Random key predistribution provides an easy way to manage the keys in a large-scale network without using public key cryptography, which is considered to be expensive. Our protocol aims to establish secure paths in a sensor network between a controller and a set of nodes where each node has been assigned a set of randomly chosen keys out of a key pool. A common model for sensor networks assumes a tree of sensor nodes delivering information to the controller according to an inquiry sent into the network. However, if we require the communication to be secure among the sensor nodes, such a tree cannot always be built efficiently. For example, when the nodes are assigned randomly chosen keys, many of them may not communicate directly since they do not often share a common key. However, these two nodes may communicate .indirectly but securely over a multiple hop path where each pair of nodes on this path shares a common key. Our protocol bridges the gap between these two cases by -.providing the methods for nodes to securely share their keys and communicate directly so that the efficiency of communications is increased without jeopardizing the security. In this way, our protocol generates secure and efficient routes. We also provide simulation results for our protocol demonstrating that, for a small number of keys stored at each node, the average path length is smaller. However, the gains due to our protocol diminish as the number of available keys at each node increases since two nodes within communication range of each other are more likely to have a key in common
    corecore