• DocumentCode
    253292
  • Title

    Connectivity in secure wireless sensor networks under transmission constraints

  • Author

    Jun Zhao ; Yagan, O. ; Gligor, V.

  • Author_Institution
    Dept. of ECE, Carnegie Mellon Univ., Pittsburgh, PA, USA
  • fYear
    2014
  • fDate
    Sept. 30 2014-Oct. 3 2014
  • Firstpage
    1294
  • Lastpage
    1301
  • Abstract
    In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.
  • Keywords
    telecommunication security; wireless sensor networks; Eschenauer-Gligor key predistribution scheme; WSN; physical transmission constraints; secure communications; secure wireless sensor networks; transmission constraints; Artificial neural networks; Cryptography; Educational institutions; Sensors; Spread spectrum communication; Wireless networks; Wireless sensor networks; Connectivity; disk model; key predistribution; random geometric graph; random intersection graph; random key graph; sensor network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on
  • Conference_Location
    Monticello, IL
  • Type

    conf

  • DOI
    10.1109/ALLERTON.2014.7028605
  • Filename
    7028605