Title :
Connectivity in secure wireless sensor networks under transmission constraints
Author :
Jun Zhao ; Yagan, O. ; Gligor, V.
Author_Institution :
Dept. of ECE, Carnegie Mellon Univ., Pittsburgh, PA, USA
fDate :
Sept. 30 2014-Oct. 3 2014
Abstract :
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.
Keywords :
telecommunication security; wireless sensor networks; Eschenauer-Gligor key predistribution scheme; WSN; physical transmission constraints; secure communications; secure wireless sensor networks; transmission constraints; Artificial neural networks; Cryptography; Educational institutions; Sensors; Spread spectrum communication; Wireless networks; Wireless sensor networks; Connectivity; disk model; key predistribution; random geometric graph; random intersection graph; random key graph; sensor network;
Conference_Titel :
Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on
Conference_Location :
Monticello, IL
DOI :
10.1109/ALLERTON.2014.7028605