Designing Securely Connected Wireless Sensor Networks in the Presence of Unreliable Links

@article{Yagan2011DesigningSC,
  title={Designing Securely Connected Wireless Sensor Networks in the Presence of Unreliable Links},
  author={Osman Yagan and Armand M. Makowski},
  journal={2011 IEEE International Conference on Communications (ICC)},
  year={2011},
  pages={1-5}
}
We investigate the secure connectivity of wireless sensor networks under the pairwise key distribution scheme of Chan et al.. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the network i) has no secure node which is isolated, and ii) is securely connected, both with high… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

$k$ -Connectivity in Random $K$ -Out Graphs Intersecting Erdős-Rényi Graphs

IEEE Transactions on Information Theory • 2017
View 11 Excerpts
Highly Influenced

Secure and reliable connectivity in heterogeneous wireless sensor networks

2017 IEEE International Symposium on Information Theory (ISIT) • 2017

Connectivity in inhomogeneous random key graphs

2016 IEEE International Symposium on Information Theory (ISIT) • 2016
View 1 Excerpt

Minimum node degree in inhomogeneous random key graphs with unreliable links

2016 IEEE International Symposium on Information Theory (ISIT) • 2016

References

Publications referenced by this paper.
Showing 1-10 of 19 references

Random Key Predistribution Schemes for Sensor Networks

IEEE Symposium on Security and Privacy • 2003
View 5 Excerpts
Highly Influenced

A key-management scheme for distributed sensor networks

ACM Conference on Computer and Communications Security • 2002
View 4 Excerpts
Highly Influenced

Zero–One Laws for Connectivity in Random Key Graphs

IEEE Transactions on Information Theory • 2012
View 1 Excerpt

On the gradual deployment of random pairwise key distribution schemes

2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks • 2011
View 2 Excerpts

Similar Papers

Loading similar papers…