DocumentCode
253292
Title
Connectivity in secure wireless sensor networks under transmission constraints
Author
Jun Zhao ; Yagan, O. ; Gligor, V.
Author_Institution
Dept. of ECE, Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear
2014
fDate
Sept. 30 2014-Oct. 3 2014
Firstpage
1294
Lastpage
1301
Abstract
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.
Keywords
telecommunication security; wireless sensor networks; Eschenauer-Gligor key predistribution scheme; WSN; physical transmission constraints; secure communications; secure wireless sensor networks; transmission constraints; Artificial neural networks; Cryptography; Educational institutions; Sensors; Spread spectrum communication; Wireless networks; Wireless sensor networks; Connectivity; disk model; key predistribution; random geometric graph; random intersection graph; random key graph; sensor network;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on
Conference_Location
Monticello, IL
Type
conf
DOI
10.1109/ALLERTON.2014.7028605
Filename
7028605
Link To Document