ON MAXIMUM KEY POOL SIZE FOR A KEY PRE-DISTRIBUTION SCHEME IN WIRELESS SENSOR NETWORKS

N. Mittal and T.R. Belagodu

References

  1. [1] L. Eschenauer & V. Gligor, A key management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2002, 41–47.
  2. [2] H. Chan, A. Perrig, & D. Song, Random key predistribution schemes for sensor networks, Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2003, 197–213.
  3. [3] W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, & A. Khalili, A pairwise key pre-distribution scheme for wireless sensor networks, ACM Transactions on Information and System Security (TISSEC), 8(2), 2005, 228–258.
  4. [4] J. Lee & D.R. Stinson, Deterministic key predistribution schemes for distributed sensor networks, Proceedings of the Annual Symposium on Selected Areas in Cryptography, Waterloo, Canada, 2004, 294–307.
  5. [5] J. Lee & D.R. Stinson, A combinatorial approach to key pre-distribution for distributed sensor networks, Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, 2005, paper PHY53-06.
  6. [6] S.A. C¸amtepe & B. Yener, Combinatorial design of key distribution mechanisms for wireless sensor networks, Proceedings of the 9th European Symposium on Research Computer Security (ESORICS), Sophia Antipolis, French Riviera, France, 2004, 293–308.
  7. [7] D. Liu, P. Ning, & R. Li, Establishing pairwise keys in distributed sensor networks, ACM Transactions on Information and System Security (TISSEC), 8(1), 2005, 41–77.
  8. [8] N. Mittal & T.R. Belagodu, On maximum key pool size for a key pre-distribution scheme in wireless sensor networks, Technical Report UTDCS-17-06, Department of Computer Science, The University of Texas at Dallas, March 2006.
  9. [9] W. Du, J. Deng, Y.S. Han, & P.K. Varshney, A pairwise key pre-distribution scheme for sensor networks using deployment knowledge, IEEE Transactions on Dependable and Secure Computing, 3(2), 2006, 62–77.
  10. [10] D. Liu & P. Ning, Improving key pre-distribution with deployment knowledge in static sensor networks, ACM Transactions on Sensor Networks (TOSN), 1(2), 2005, 204–239.
  11. [11] D. Liu, P. Ning, & W. Du, Group-based key predistribution for wireless sensor networks, ACM Transactions on Sensor Networks (TOSN), 4(2), 2008, 1–30.
  12. [12] R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology—Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), Paris, France, 1984, 335–338.
  13. [13] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, & M. Yung, Perfectly-secure key distribution for dynamic conferences, Advances in Cryptology—Proceedings of the Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, 1992, 471–486.

Important Links:

Go Back