Combinatorial design of key distribution mechanisms for wireless sensor networks

Camtepe, Seyit A. & Yener, Bulent (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, Pierangela, Ryan, Peter, Gollmann, Dieter, & Molva, Refik (Eds.) Lecture Notes in Computer Science, Computer Security – ESORICS 2004, Springer Berlin Heidelberg, Institut Eurecom, Sophia Antipolis, French Riviera, France, pp. 293-308.

View at publisher


Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Impact and interest:

55 citations in Scopus
Search Google Scholar™
52 citations in Web of Science®

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

ID Code: 57431
Item Type: Conference Paper
Refereed: Yes
Keywords: Key management, Wireless sensor network security, Block desing
DOI: 10.1007/978-3-540-30108-0_18
ISBN: 978-3-540-22987-2
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DISTRIBUTED COMPUTING (080500)
Australian and New Zealand Standard Research Classification > TECHNOLOGY (100000) > COMMUNICATIONS TECHNOLOGIES (100500) > Computer Communications Networks (100503)
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2004 Springer-Verlag Berlin Heidelberg
Deposited On: 20 Feb 2013 22:33
Last Modified: 22 Mar 2013 03:42

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page