Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks
@article{Blackburn2010DistinctDC, title={Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks}, author={Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson}, journal={IEEE Transactions on Information Theory}, year={2010}, volume={56}, pages={3961-3972} }
A distinct difference configuration is a set of points in Z2 with the property that the vectors (difference vectors) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the k-hop coverage of a distinct…
23 Citations
A unified approach to combinatorial key predistribution schemes for sensor networks
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2011
This work defines a new, general class of designs, termed “partially balanced t-designs”, that is sufficiently general that it encompasses almost all of the designs that have been proposed for combinatorial key predistribution schemes.
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
- Computer ScienceIEEE Transactions on Information Theory
- 2010
Rather than restricting dots to lie in a square or rectangle, this work restricts the maximum distance between dots of the configuration; the motivation for this is a new application of such configurations to key distribution in wireless sensor networks.
Location Dependent Key Predistribution Scheme for Square Grid and Hexagonal Grid
- Computer Science
- 2017
This paper proposes an algorithm using adjacency matrix of the network for square and hexagonal grid network to design a location aware key pre-distribution scheme for wireless sensor network deployed in square grid andhexagonal grid with minimum possible keys stored in each nodes.
Key Pre-Distributions From Graph-Based Block Designs
- Computer ScienceIEEE Sensors Journal
- 2016
This paper considers prior knowledge of network characteristics and application constraints in terms of communication needs between sensor nodes, and proposes methods to design key pre-distribution schemes, in order to provide better security and connectivity while requiring less resources.
Generalised key distribution patterns
- Computer Science, Mathematics
- 2012
Methods from set theory and ideas from convex analysis are used in order to construct general structures and provide some mathematical insight into their behaviour and analyse these general structures by exploiting the proof techniques of other authors in new ways, tightening existing inequalities and generalising results from the literature.
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
- Computer ScienceANT/MobiWIS
- 2011
The Rise and Fall and Rise of Combinatorial Key Predistribution
- Mathematics, Computer ScienceSelected Areas in Cryptography
- 2010
It is explained why the problem of how most effectively to predistribute keys is back "in fashion" after a period of limited attention by the research community, and the appropriateness of combinatorial techniques for key distribution is considered.
Problems on Two-Dimensional Synchronization Patterns
- Computer ScienceIWCC
- 2009
This work describes several solution techniques and presents some open problems in two-dimensional synchronization patterns, a sequence of dots in which the out-of-phase autocorrelation function takes the values zero or one.
Sidon sequences and doubly periodic two-dimensional synchronization patterns
- Mathematics, Computer Science2011 IEEE International Symposium on Information Theory Proceedings
- 2011
This paper presents sufficient conditions that a two-dimensional synchronization pattern can be transformed into a Sidon sequence and presents a new construction for Sidon sequences over an alphabet of size q(q − 1), where q is a power of a prime.
The Research of the Information Security Group
- Computer Science
- 2013
Royal Holloway, University of London (RHUL) is an academic centre of excellence in cyber security, one of eight such centres in the UK recognized by GCHQ and one of the largest academic information security groups in the world.
References
SHOWING 1-10 OF 60 REFERENCES
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs
- MathematicsTSEC
- 2008
It is shown that the performance of a KPS can be improved by carefully choosing a certain class of set systems as “key ring spaces”, and two types of transversal designs are employed, which turn out to have significant efficiency in a shared-key discovery phase without degrading connectivity and resiliency.
Random key predistribution schemes for sensor networks
- Computer Science, Mathematics2003 Symposium on Security and Privacy, 2003.
- 2003
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes
- Computer ScienceIEEE Transactions on Information Theory
- 2010
Rather than restricting dots to lie in a square or rectangle, this work restricts the maximum distance between dots of the configuration; the motivation for this is a new application of such configurations to key distribution in wireless sensor networks.
A pairwise key predistribution scheme for wireless sensor networks
- Computer ScienceTSEC
- 2005
A new key predistribution scheme is proposed which substantially improves the resilience of the network compared to previous schemes, and an in-depth analysis of the scheme in terms of network resilience and associated overhead is given.
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
- Computer Science2006 IEEE International Conference on Communications
- 2006
This paper presents a deterministic key distribution scheme based on Expander Graphs and shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expandergraph to the desired properties of a key distribution schemes for a physical network topology.
A pairwise key pre-distribution scheme for wireless sensor networks
- Computer ScienceCCS '03
- 2003
This paper proposes a new key pre-distribution scheme, which substantially improves the resilience of the network compared to the existing schemes, and exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that any nodes other than these compromised nodes are affected is close to zero.
Efficient Key Predistribution for Grid-Based Wireless Sensor Networks
- Computer Science, MathematicsICITS
- 2008
This paper describes how Costas arrays can be used for key predistribution in wireless sensor networks, then defines distinct difference configurations, a more general structure that provides a flexible choice of parameters in such schemes.
Constructions and properties of Costas arrays
- MathematicsProceedings of the IEEE
- 1984
A Costas array is an n × n array of dots and blanks with exactly one dot in each row and column, and with distinct vector differences between all pairs of dots. As a frequency-hop pattern for radar…
Key distribution mechanisms for wireless sensor networks : a survey
- Computer Science
- 2005
This work evaluates deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys in distributed and hierarchical wireless sensor networks.
The design space of wireless sensor networks
- Computer ScienceIEEE Wireless Communications
- 2004
This article discusses the consequences of this fact with regard to the design space of wireless sensor networks by considering its various dimensions and justifies the view by demonstrating that specific existing applications occupy different points in thedesign space.