SlideShare a Scribd company logo
Modeling the Pairwise Key Predistribution Scheme
in the Presence of Unreliable Links
ABSTRACT:
We investigate the secure connectivity of wireless sensor networks under the
random pairwise key predistribution scheme of Chan, Perrig, and Song. Unlike
recent work carried out under the assumption of full visibility, here we assume a
(simplified) communication model where unreliable wireless links are represented
as independent on/off channels.We present conditions on how to scale the model
parameters so that the network 1) has no secure node that is isolated and 2) is
securely connected, both with high probability, when the number of sensor nodes
becomes large. The results are given in the form of zero-one laws, and exhibit
significant differences with corresponding results in the full-visibility case.
Through simulations, these zero-one laws are shown to also hold under a more
realistic communication model, namely the disk model.
EXISTING SYSTEM:
Many security schemes developed for general network environments do not take
into account the unique features of WSNs: Public key cryptography is not feasible
computationally because of the severe limitations imposed on the physical memory
and power consumption of the individual sensors. Traditional key exchange and
distribution protocols are based on trusting third parties, and this makes them
inadequate for large-scale WSNs whose topologies are unknown prior to
deployment. Random key predistribution schemes were introduced to address some
of these difficulties. The idea of randomly assigning secure keys to sensor nodes
prior to network deployment was first introduced by Eschenauer and Gligor. The
approach we use here considers random graph models naturally induced by a given
scheme, and then develops models naturally induced by a given scheme, and then
develops the scaling laws corresponding to desirable network properties, e.g.,
absence of secure nodes that are isolated, secure connectivity, etc. This is done
with the aim of deriving guidelines to dimension the scheme, namely adjust its
parameters so that these properties occur.
DISADVANTAGES OF EXISTING SYSTEM:
To be sure, the full-visibility assumption does away with the wireless nature of the
communication medium supporting WSNs. In return, this simplification makes it
possible to focus on how randomization in the key assignments alone affects the
establishment of a secure network in the best of circumstances, i.e., when there are
no link failures. A common criticism of this line of work is that by disregarding the
unreliability of the wireless links, the resulting dimensioning guidelines are likely
to be too optimistic: In practice, nodes will have fewer neighbors since some of the
communication links may be impaired. As a result, the desired connectivity
properties may not be achieved if dimensioning is done according to results
derived under full visibility.
PROPOSED SYSTEM:
In this paper, in an attempt to go beyond full visibility, we revisit the pairwise key
predistribution scheme of Chan et al. under more realistic assumptions that account
for the possibility that communication links between nodes may not be available.
This could occur due to the presence of physical barriers between nodes or because
of harsh environmental conditions severely impairing transmission. To study such
situations, we introduce a simple communication model where channels are
mutually independent, and are either on or off. An overall system model is then
constructed by intersecting the random graph model of the pairwise key
distribution scheme (under full visibility).
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : Windows XP.
• Coding Language : C#.Net.
• Data Base : SQL Server 2005
• Tool : VISUAL STUDIO 2008.
REFERENCE:
Osman Yağan, Member, IEEE, and Armand M. Makowski, Fellow, IEEE
“Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable
Links”-IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59,
NO. 3, MARCH 2013.

More Related Content

DOCX
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
DOCX
containing byzantine failures with control zones
PDF
Anonymization of centralized and distributed social networks by sequential cl...
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
Research on key predistribution scheme of wireless sensor networks
DOCX
NS2 Projects 2014
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
containing byzantine failures with control zones
Anonymization of centralized and distributed social networks by sequential cl...
A highly scalable key pre distribution scheme for wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
NS2 Projects 2014
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...

What's hot (13)

DOCX
The three tier security scheme in wireless
PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
Secure data aggregation technique for wireless
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
JPJ1431 top-k Query Result Completeness Verification
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
PDF
A Distributed Cut Detection Method for Wireless Sensor Networks
PDF
Reliability in wsn for security
The three tier security scheme in wireless
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
Node-Level Trust Evaluation in Wireless Sensor Networks
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
JPJ1431 top-k Query Result Completeness Verification
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
A Distributed Cut Detection Method for Wireless Sensor Networks
Reliability in wsn for security
Ad

Viewers also liked (19)

DOCX
Toward a statistical framework for source anonymity in sensor networks
DOCX
Securing class initialization in java like languages
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
DOCX
On quality of monitoring for multi channel wireless infrastructure networks
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
DOCX
Preventing private information inference attacks on social networks
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
DOCX
Fast transmission to remote cooperative groups a new key management paradigm
DOCX
Document clustering for forensic analysis an approach for improving computer ...
DOCX
Optimal multicast capacity and delay tradeoffs in manets
DOCX
Harnessing the cloud for securely outsourcing large scale systems of linear e...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
DOCX
Evolution of social networks based on tagging practices
DOCX
Dynamic control of coding for progressive packet arrivals in dtns
DOCX
Personalized qos aware web service recommendation and visualization
DOCX
Opportunistic mane ts mobility can make up for low transmission power
DOCX
Security analysis of a privacy preserving decentralized key-policy attribute-...
PDF
ieee 2013 best project titles with latest techniques
DOCX
A survey of xml tree patterns
Toward a statistical framework for source anonymity in sensor networks
Securing class initialization in java like languages
Discovery and verification of neighbor positions in mobile ad hoc networks
On quality of monitoring for multi channel wireless infrastructure networks
Vampire attacks draining life from wireless ad hoc sensor networks
Preventing private information inference attacks on social networks
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Fast transmission to remote cooperative groups a new key management paradigm
Document clustering for forensic analysis an approach for improving computer ...
Optimal multicast capacity and delay tradeoffs in manets
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Mona secure multi owner data sharing for dynamic groups in the cloud
Evolution of social networks based on tagging practices
Dynamic control of coding for progressive packet arrivals in dtns
Personalized qos aware web service recommendation and visualization
Opportunistic mane ts mobility can make up for low transmission power
Security analysis of a privacy preserving decentralized key-policy attribute-...
ieee 2013 best project titles with latest techniques
A survey of xml tree patterns
Ad

Similar to Modeling the pairwise key predistribution scheme in the presence of unreliable links (20)

PPTX
Modelling pairwise key predistribution in the presence of unreliable links
PDF
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
PDF
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
PDF
Survey of the end to end secure communication in ADHOC networks
PDF
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
PDF
Review on key predistribution schemes in wireless sensor networks
PDF
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
PDF
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
PDF
Secure and efficient key pre distribution schemes for wsn using combinatorial...
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PDF
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
PDF
Ijcnc050210
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PDF
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
PDF
Secure multipath routing scheme using key
PDF
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
DOC
Novel secure communication protocol basepaper
Modelling pairwise key predistribution in the presence of unreliable links
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
Survey of the end to end secure communication in ADHOC networks
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
Review on key predistribution schemes in wireless sensor networks
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
Enhancing the Security in WSN using Three Tier Security Architecture
Ijcnc050210
A highly scalable key pre distribution scheme for wireless sensor networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
Secure multipath routing scheme using key
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
Novel secure communication protocol basepaper

Recently uploaded (20)

PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction to Building Materials
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Trump Administration's workforce development strategy
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Lesson notes of climatology university.
PDF
advance database management system book.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Computing-Curriculum for Schools in Ghana
A systematic review of self-coping strategies used by university students to ...
Introduction to Building Materials
Paper A Mock Exam 9_ Attempt review.pdf.
Digestion and Absorption of Carbohydrates, Proteina and Fats
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A powerpoint presentation on the Revised K-10 Science Shaping Paper
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Trump Administration's workforce development strategy
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chinmaya Tiranga quiz Grand Finale.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
What if we spent less time fighting change, and more time building what’s rig...
Lesson notes of climatology university.
advance database management system book.pdf
Classroom Observation Tools for Teachers
Computing-Curriculum for Schools in Ghana

Modeling the pairwise key predistribution scheme in the presence of unreliable links

  • 1. Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links ABSTRACT: We investigate the secure connectivity of wireless sensor networks under the random pairwise key predistribution scheme of Chan, Perrig, and Song. Unlike recent work carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as independent on/off channels.We present conditions on how to scale the model parameters so that the network 1) has no secure node that is isolated and 2) is securely connected, both with high probability, when the number of sensor nodes becomes large. The results are given in the form of zero-one laws, and exhibit significant differences with corresponding results in the full-visibility case. Through simulations, these zero-one laws are shown to also hold under a more realistic communication model, namely the disk model. EXISTING SYSTEM: Many security schemes developed for general network environments do not take into account the unique features of WSNs: Public key cryptography is not feasible computationally because of the severe limitations imposed on the physical memory
  • 2. and power consumption of the individual sensors. Traditional key exchange and distribution protocols are based on trusting third parties, and this makes them inadequate for large-scale WSNs whose topologies are unknown prior to deployment. Random key predistribution schemes were introduced to address some of these difficulties. The idea of randomly assigning secure keys to sensor nodes prior to network deployment was first introduced by Eschenauer and Gligor. The approach we use here considers random graph models naturally induced by a given scheme, and then develops models naturally induced by a given scheme, and then develops the scaling laws corresponding to desirable network properties, e.g., absence of secure nodes that are isolated, secure connectivity, etc. This is done with the aim of deriving guidelines to dimension the scheme, namely adjust its parameters so that these properties occur. DISADVANTAGES OF EXISTING SYSTEM: To be sure, the full-visibility assumption does away with the wireless nature of the communication medium supporting WSNs. In return, this simplification makes it possible to focus on how randomization in the key assignments alone affects the establishment of a secure network in the best of circumstances, i.e., when there are no link failures. A common criticism of this line of work is that by disregarding the unreliability of the wireless links, the resulting dimensioning guidelines are likely to be too optimistic: In practice, nodes will have fewer neighbors since some of the
  • 3. communication links may be impaired. As a result, the desired connectivity properties may not be achieved if dimensioning is done according to results derived under full visibility. PROPOSED SYSTEM: In this paper, in an attempt to go beyond full visibility, we revisit the pairwise key predistribution scheme of Chan et al. under more realistic assumptions that account for the possibility that communication links between nodes may not be available. This could occur due to the presence of physical barriers between nodes or because of harsh environmental conditions severely impairing transmission. To study such situations, we introduce a simple communication model where channels are mutually independent, and are either on or off. An overall system model is then constructed by intersecting the random graph model of the pairwise key distribution scheme (under full visibility). SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz
  • 4.  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : Windows XP. • Coding Language : C#.Net. • Data Base : SQL Server 2005 • Tool : VISUAL STUDIO 2008. REFERENCE: Osman Yağan, Member, IEEE, and Armand M. Makowski, Fellow, IEEE “Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links”-IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013.