SlideShare a Scribd company logo
A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
ABSTRACT:
Given the sensitivity of the potential WSN applications and because of resource
limitations, key management emerges as a challenging issue for WSNs. One of the
main concerns when designing a key management scheme is the network
scalability. Indeed, the protocol should support a large number of nodes to enable a
large scale deployment of the network. In this paper, we propose a new scalable
key management scheme for WSNs which provides a good secure connectivity
coverage. For this purpose, we make use of the unital design theory. We show that
the basic mapping from unitals to key pre-distribution allows us to achieve high
network scalability. Nonetheless, this naive mapping does not guarantee a high key
sharing probability. Therefore, we propose an enhanced unital-based key pre-
distribution scheme providing high network scalability and good key sharing
probability approximately lower bounded by 1 − e 0.632. We conduct
approximate analysis and simulations and compare our solution to those of existing
methods for different criteria such as storage overhead, network scalability,
network connectivity, average secure path length and network resiliency. Our
results show that the proposed approach enhances the network scalability while
providing high secure connectivity coverage and overall improved performance.
Moreover, for an equal network size, our solution reduces significantly the storage
overhead compared to those of existing solutions.
EXISTING SYSTEM:
Wireless sensor networks (WSNs) are increasingly used in critical applications
within several fields including military, medical and industrial sectors. Given the
sensitivity of these applications, sophisticated security services are required. Key
management is a corner stone for many security services such as confidentiality
and authentication which are required to secure communications in WSNs. The
establishment of secure links between nodes is then a challenging problem in
WSNs. Because of resource limitations, symmetric key establishment is one of the
most suitable paradigms for securing exchanges in WSNs. On the other hand,
because of the lack of infrastructure in WSNs, we have usually no trusted third
party which can attribute pair wise secret keys to neighboring nodes, that is why
most existing solutions are based on key pre-distribution.
DISADVANTAGES OF EXISTING SYSTEM:
A host of research work dealt with symmetric key pre-distribution issue for WSNs
and many solutions have been proposed In the existing system many disadvantages
occur: the design of key rings (blocks of keys) is strongly related to the network
size, these solutions either suffer from low scalability (number of supported
nodes), or degrade other performance metrics including secure connectivity,
storage overhead and resiliency in the case of large networks.
PROPOSED SYSTEM:
In this proposed system, our aim is to tackle the scalability issue without degrading
the other network performance metrics. For this purpose, we target the design of a
scheme which ensures a good secure coverage of large scale networks with a low
key storage overhead and a good network resiliency. To this end, we make use, of
the unital design theory for efficient WSN key pre-distribution.
ADVANTAGES OF PROPOSED SYSTEM:
The advantages of the proposed system as follows:
We propose a naive mapping from unital design to key pre-distribution and
we show through analytical analysis that it allows to achieve high
scalability.
We propose an enhanced unitalbased key pre-distribution scheme that
maintains a good key sharing probability while enhancing the network
scalability.
We analyze and compare our new approach against main existing schemes,
with respect to different criteria: storage overhead, energy consumption,
network scalability, secure connectivity coverage, average secure path
length and network resiliency.
SYSTEM ARCHITECTURE:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : Windows XP.
• Coding Language : C#.Net.
• Data Base : SQL Server 2005
• Tool : VISUAL STUDIO 2008.
REFERENCE:
Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A
Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”-
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12,
NO. 2, FEBRUARY 2013

More Related Content

DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
A distributed fault intrusion tolerant sensor
DOCX
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
A secure scheme against power exhausting
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOC
Novel secure communication protocol basepaper
PPTX
Internet of things (io t)
A highly scalable key pre distribution scheme for wireless sensor networks
A distributed fault intrusion tolerant sensor
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Secure data aggregation technique for wireless sensor networks in the presenc...
A secure scheme against power exhausting
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Novel secure communication protocol basepaper
Internet of things (io t)

What's hot (19)

DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
PDF
Security Model for Hierarchical Clustered Wireless Sensor Networks
DOCX
Access policy consolidation for event processing systems
DOCX
Access policy consolidation for event processing systems
PDF
Psdot 12 a secure erasure code-based cloud storage
DOCX
Privacy preserving delegated access control in public clouds
DOCX
JPJ1431 top-k Query Result Completeness Verification
DOCX
Collaborative network security in multi tenant data center for cloud computing
DOCX
Privacy preserving delegated access control in public clouds
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
PPTX
Secure sensitive data sharing on a big data platform
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
PPTX
Wsn1 ppt
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Secure and efficient data transmission for cluster based wireless sensor netw...
Security Model for Hierarchical Clustered Wireless Sensor Networks
Access policy consolidation for event processing systems
Access policy consolidation for event processing systems
Psdot 12 a secure erasure code-based cloud storage
Privacy preserving delegated access control in public clouds
JPJ1431 top-k Query Result Completeness Verification
Collaborative network security in multi tenant data center for cloud computing
Privacy preserving delegated access control in public clouds
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Secure sensitive data sharing on a big data platform
Mona secure multi owner data sharing for dynamic groups in the cloud
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
Enhancing the Security in WSN using Three Tier Security Architecture
Wsn1 ppt
Ad

Viewers also liked (18)

PDF
2013 ieee java project titles for cse, it and mca
PDF
Facilitating document annotation using content and querying value
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
DOCX
Participatory privacy enabling privacy in participatory sensing
PDF
2013 14 ieee ece project titles - jp infotech
DOC
IEEE PROJECTS FOR ECE 2013 2014
DOCX
Efficient algorithms for neighbor discovery in wireless networks
DOCX
Network assisted mobile computing with optimal uplink query processing
PDF
Twitsper tweeting privately
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
Identity based secure distributed data storage schemes
PDF
final year ieee projects in pondicherry
DOCX
Distributed cooperative caching in social wireless networks
DOCX
Secure mining of association rules in horizontally distributed databases
2013 ieee java project titles for cse, it and mca
Facilitating document annotation using content and querying value
Towards secure multi keyword top-k retrieval over encrypted cloud data
A rank correlation based detection against distributed reflection do s attacks
Using fuzzy logic control to provide intelligent traffic management service f...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Participatory privacy enabling privacy in participatory sensing
2013 14 ieee ece project titles - jp infotech
IEEE PROJECTS FOR ECE 2013 2014
Efficient algorithms for neighbor discovery in wireless networks
Network assisted mobile computing with optimal uplink query processing
Twitsper tweeting privately
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Back pressure-based packet-by-packet adaptive routing in communication networks
Identity based secure distributed data storage schemes
final year ieee projects in pondicherry
Distributed cooperative caching in social wireless networks
Secure mining of association rules in horizontally distributed databases
Ad

Similar to A highly scalable key pre distribution scheme for wireless sensor networks (20)

PDF
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
PPTX
Safest Way of Message or File Transfer using Key Distribution
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
PDF
Secure and Trustable Routing in WSN for End to End Communication
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
DOCX
secure and efficient data transmission for cluster-based wireless sensor netw...
PPTX
Secure and efficient data transmission for cluster based wireless
PDF
IEEE Networking 2016 Title and Abstract
PDF
Study Of Coded Based Mechanism In WSN System
PDF
Research on key predistribution scheme of wireless sensor networks
PDF
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
PDF
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
PDF
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
PDF
2.espk external agent authentication and session key establishment using publ...
DOCX
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
PDF
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
PPTX
Modelling pairwise key predistribution in the presence of unreliable links
Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor N...
Safest Way of Message or File Transfer using Key Distribution
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
Secure and Trustable Routing in WSN for End to End Communication
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
secure and efficient data transmission for cluster-based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless
IEEE Networking 2016 Title and Abstract
Study Of Coded Based Mechanism In WSN System
Research on key predistribution scheme of wireless sensor networks
IRJET- Easy to Implement Searchable Encryption Scheme for Cloud-Assisted Wire...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
2.espk external agent authentication and session key establishment using publ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
IEEE 2014 JAVA NETWORKING PROJECTS Secure and efficient data transmission for...
A Survey on Secure Alternate Path Selection for Enhanced Network Lifetime in ...
Modelling pairwise key predistribution in the presence of unreliable links

Recently uploaded (20)

PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Business Ethics Teaching Materials for college
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O5-L3 Freight Transport Ops (International) V1.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Anesthesia in Laparoscopic Surgery in India
FourierSeries-QuestionsWithAnswers(Part-A).pdf
01-Introduction-to-Information-Management.pdf
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Abdominal Access Techniques with Prof. Dr. R K Mishra
Business Ethics Teaching Materials for college
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .
Pharmacology of Heart Failure /Pharmacotherapy of CHF

A highly scalable key pre distribution scheme for wireless sensor networks

  • 1. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks ABSTRACT: Given the sensitivity of the potential WSN applications and because of resource limitations, key management emerges as a challenging issue for WSNs. One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes to enable a large scale deployment of the network. In this paper, we propose a new scalable key management scheme for WSNs which provides a good secure connectivity coverage. For this purpose, we make use of the unital design theory. We show that the basic mapping from unitals to key pre-distribution allows us to achieve high network scalability. Nonetheless, this naive mapping does not guarantee a high key sharing probability. Therefore, we propose an enhanced unital-based key pre- distribution scheme providing high network scalability and good key sharing probability approximately lower bounded by 1 − e 0.632. We conduct approximate analysis and simulations and compare our solution to those of existing methods for different criteria such as storage overhead, network scalability, network connectivity, average secure path length and network resiliency. Our results show that the proposed approach enhances the network scalability while providing high secure connectivity coverage and overall improved performance.
  • 2. Moreover, for an equal network size, our solution reduces significantly the storage overhead compared to those of existing solutions. EXISTING SYSTEM: Wireless sensor networks (WSNs) are increasingly used in critical applications within several fields including military, medical and industrial sectors. Given the sensitivity of these applications, sophisticated security services are required. Key management is a corner stone for many security services such as confidentiality and authentication which are required to secure communications in WSNs. The establishment of secure links between nodes is then a challenging problem in WSNs. Because of resource limitations, symmetric key establishment is one of the most suitable paradigms for securing exchanges in WSNs. On the other hand, because of the lack of infrastructure in WSNs, we have usually no trusted third party which can attribute pair wise secret keys to neighboring nodes, that is why most existing solutions are based on key pre-distribution. DISADVANTAGES OF EXISTING SYSTEM: A host of research work dealt with symmetric key pre-distribution issue for WSNs and many solutions have been proposed In the existing system many disadvantages occur: the design of key rings (blocks of keys) is strongly related to the network
  • 3. size, these solutions either suffer from low scalability (number of supported nodes), or degrade other performance metrics including secure connectivity, storage overhead and resiliency in the case of large networks. PROPOSED SYSTEM: In this proposed system, our aim is to tackle the scalability issue without degrading the other network performance metrics. For this purpose, we target the design of a scheme which ensures a good secure coverage of large scale networks with a low key storage overhead and a good network resiliency. To this end, we make use, of the unital design theory for efficient WSN key pre-distribution. ADVANTAGES OF PROPOSED SYSTEM: The advantages of the proposed system as follows: We propose a naive mapping from unital design to key pre-distribution and we show through analytical analysis that it allows to achieve high scalability. We propose an enhanced unitalbased key pre-distribution scheme that maintains a good key sharing probability while enhancing the network scalability.
  • 4. We analyze and compare our new approach against main existing schemes, with respect to different criteria: storage overhead, energy consumption, network scalability, secure connectivity coverage, average secure path length and network resiliency. SYSTEM ARCHITECTURE:
  • 5. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : Windows XP. • Coding Language : C#.Net. • Data Base : SQL Server 2005 • Tool : VISUAL STUDIO 2008.
  • 6. REFERENCE: Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”- IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 2, FEBRUARY 2013