Abstract
The constraints of lightweight distributed computing environments such as wireless sensor networks lend themselves to the use of symmetric cryptography to provide security services. The lack of central infrastructure after deployment of such networks requires the necessary symmetric keys to be predistributed to participating nodes. The rich mathematical structure of combinatorial designs has resulted in the proposal of several key predistribution schemes for wireless sensor networks based on designs. We review and examine the appropriateness of combinatorial designs as a tool for building key predistribution schemes suitable for such environments.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Integrated smart sensing systems (2007), http://dpi.projectforum.com/isss/11
Institut für Chemie und Dynamik der Geosphäre (ICG), Forschungszentrum Jülich: SoilNet - a Zigbee based soil moisture sensor network (2008), http://www.fz-juelich.de/icg/icg-4/index.php?index=739
Blackburn, S.R., Etzion, T., Martin, K.M., Paterson, M.B.: Distinct-difference configurations: Multihop paths and key predistribution in sensor networks (2008), http://arxiv.org/abs/0811.3896
Blackburn, S.R., Etzion, T., Martin, K.M., Paterson, M.B.: Efficient key predistribution for grid-based wireless sensor networks. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 54–69. Springer, Heidelberg (2008)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., Santis, A.D., Vaccaro, U., Herzberg, A., Kutten, S., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Technical Report TR-05-07 (March 2005)
Chakrabarti, D., Maitra, S., Roy, B.: A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. International Journal of Information Security 5(2)
Chakrabarti, D., Seberry, J.: Combinatorial structures for design of wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 365–374. Springer, Heidelberg (2006)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (May 2003)
Colbourn, C.J., Dinitz, J.H. (eds.): The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (2007)
Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proceedings of 9th ACM Conference on Computer and Communication Security (November 2002)
Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security 11(2)
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, pp. 6–11, CD-ROM, paper PHY53-06 (2005), http://www.cacr.math.uwaterloo.ca/dstinson/pubs.html
Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Lee, J., Stinson, D.R.: Common intersection designs. Journal of Combinatorial Designs 14(4), 251–269 (2009)
Lopez, J.: Unleashing public-key cryptography in wireless sensor networks. Journal of Computer Security 14(5)
Martin, K.M.: The combinatorics of key establishment. In: Surveys in Combinatorics 2007. London Mathematical Society Lecture Note Series, vol. 346, pp. 223–273. Cambridge University Press, Cambridge (2007)
Martin, K.M., Paterson, M.B.: An application-oriented framework for wireless sensor network key establishment. Electron. Notes Theor. Comput. Sci. 192(2), 31–41 (2008)
Martin, K.M., Paterson, M.B., Stinson, D.R.: Key predistribution scheme for homogeneous wireless sensor networks with group deployment of nodes (2008), http://www.isg.rhul.ac.uk/~martin/files/gdfinal.pdf
McCulloch, J., McCarthy, P., Guru, S.M., Peng, W., Hugo, D., Terhorst, A.: Wireless sensor network deployment for water use efficiency in irrigation. In: REALWSN 2008: Proceedings of the workshop on Real-world wireless sensor networks, pp. 46–50. ACM Press, New York (2008)
Mitchell, C.J., Piper, F.C.: The cost of reducing key storage requirements in secure networks. Computers and Security 6, 339–341 (1987)
Mitchell, C.J., Piper, F.C.: Key storage in secure networks. Discrete Applied Mathematics 21, 215–228 (1988)
Park, E.C., Blake, I.F.: Reducing communication overhead of key distribution schemes for wireless sensor networks. In: Proceedings of ICCCN 2007, pp. 1345–1350. IEEE Press, Los Alamitos (2007)
Römer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications Magazine 11(6), 54–61 (2004)
Ruj, S., Roy, B.: Key predistribution using partially balanced designs in wireless sensor networks. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F. (eds.) ISPA 2007. LNCS, vol. 4742, pp. 431–445. Springer, Heidelberg (2007)
Stinson, D.R.: On some methods of unconditionally secure key distribution and broadcast encryption. Designs Codes and Cryptography 12, 215–243 (1997)
Stinson, D.R., Wei, R.: Generalized cover free families. Discrete Mathematics 279, 463–477 (2004)
Wei, R., Wu, J.: Product construction of key distribution schemes for sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 280–293. Springer, Heidelberg (2005)
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11-12), 2314–2341 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Martin, K.M. (2009). On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. In: Chee, Y.M., Li, C., Ling, S., Wang, H., Xing, C. (eds) Coding and Cryptology. IWCC 2009. Lecture Notes in Computer Science, vol 5557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01877-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-01877-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01813-8
Online ISBN: 978-3-642-01877-0
eBook Packages: Computer ScienceComputer Science (R0)