SlideShare a Scribd company logo
A Highly Scalable Key Pre-Distribution Scheme for Wireless
Sensor Networks
ABSTRACT:
Given the sensitivity of the potential WSN applications and because of resource
limitations, key management emerges as a challenging issue for WSNs. One of the
main concerns when designing a key management scheme is the network
scalability. Indeed, the protocol should support a large number of nodes to enable a
large scale deployment of the network. In this paper, we propose a new scalable
key management scheme for WSNs which provides a good secure connectivity
coverage. For this purpose, we make use of the unital design theory. We show that
the basic mapping from unitals to key pre-distribution allows us to achieve high
network scalability. Nonetheless, this naive mapping does not guarantee a high key
sharing probability. Therefore, we propose an enhanced unital-based key pre-
distribution scheme providing high network scalability and good key sharing
probability approximately lower bounded by 1 − e 0.632. We conduct
approximate analysis and simulations and compare our solution to those of existing
methods for different criteria such as storage overhead, network scalability,
network connectivity, average secure path length and network resiliency. Our
results show that the proposed approach enhances the network scalability while
providing high secure connectivity coverage and overall improved performance.
Moreover, for an equal network size, our solution reduces significantly the storage
overhead compared to those of existing solutions.
EXISTING SYSTEM:
Wireless sensor networks (WSNs) are increasingly used in critical applications
within several fields including military, medical and industrial sectors. Given the
sensitivity of these applications, sophisticated security services are required. Key
management is a corner stone for many security services such as confidentiality
and authentication which are required to secure communications in WSNs. The
establishment of secure links between nodes is then a challenging problem in
WSNs. Because of resource limitations, symmetric key establishment is one of the
most suitable paradigms for securing exchanges in WSNs. On the other hand,
because of the lack of infrastructure in WSNs, we have usually no trusted third
party which can attribute pair wise secret keys to neighboring nodes, that is why
most existing solutions are based on key pre-distribution.
DISADVANTAGES OF EXISTING SYSTEM:
A host of research work dealt with symmetric key pre-distribution issue for WSNs
and many solutions have been proposed In the existing system many disadvantages
occur: the design of key rings (blocks of keys) is strongly related to the network
size, these solutions either suffer from low scalability (number of supported
nodes), or degrade other performance metrics including secure connectivity,
storage overhead and resiliency in the case of large networks.
PROPOSED SYSTEM:
In this proposed system, our aim is to tackle the scalability issue without degrading
the other network performance metrics. For this purpose, we target the design of a
scheme which ensures a good secure coverage of large scale networks with a low
key storage overhead and a good network resiliency. To this end, we make use, of
the unital design theory for efficient WSN key pre-distribution.
ADVANTAGES OF PROPOSED SYSTEM:
The advantages of the proposed system as follows:
We propose a naive mapping from unital design to key pre-distribution and
we show through analytical analysis that it allows to achieve high
scalability.
We propose an enhanced unitalbased key pre-distribution scheme that
maintains a good key sharing probability while enhancing the network
scalability.
We analyze and compare our new approach against main existing schemes,
with respect to different criteria: storage overhead, energy consumption,
network scalability, secure connectivity coverage, average secure path
length and network resiliency.
SYSTEM ARCHITECTURE:
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A
Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”-
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO.
2, FEBRUARY 2013

More Related Content

DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
A distributed fault intrusion tolerant sensor
DOCX
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
Secure data aggregation technique for wireless
DOCX
A secure scheme against power exhausting
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
A highly scalable key pre distribution scheme for wireless sensor networks
A distributed fault intrusion tolerant sensor
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless
A secure scheme against power exhausting
A secure scheme against power exhausting attacks in hierarchical wireless sen...

What's hot (16)

PDF
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
PPTX
Internet of things (io t)
DOC
Novel secure communication protocol basepaper
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
DOCX
Privacy preserving delegated access control in public clouds
PDF
Security Model for Hierarchical Clustered Wireless Sensor Networks
DOCX
Access policy consolidation for event processing systems
DOCX
Access policy consolidation for event processing systems
DOCX
Privacy preserving delegated access control in public clouds
DOCX
JPJ1431 top-k Query Result Completeness Verification
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
DOCX
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Internet of things (io t)
Novel secure communication protocol basepaper
A secure scheme against power exhausting attacks in hierarchical wireless sen...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
Privacy preserving delegated access control in public clouds
Security Model for Hierarchical Clustered Wireless Sensor Networks
Access policy consolidation for event processing systems
Access policy consolidation for event processing systems
Privacy preserving delegated access control in public clouds
JPJ1431 top-k Query Result Completeness Verification
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in C...
Mona secure multi owner data sharing for dynamic groups in the cloud
Ad

Viewers also liked (18)

DOCX
Anonymization of centralized and distributed social networks by sequential cl...
DOCX
Pmse a personalized mobile search engine
DOCX
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Secure encounter based mobile social networks requirements, designs, and trad...
DOCX
Efficient rekeying framework for secure multicast with diverse subscription-p...
DOCX
Cost based optimization of service compositions
DOCX
Distributed processing of probabilistic top k queries in wireless sensor netw...
DOC
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Privacy preserving data sharing with anonymous id assignment
DOCX
Cross domain privacy-preserving cooperative firewall optimization
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
DOCX
Beyond text qa multimedia answer generation by harvesting web information
DOCX
Attribute based encryption with verifiable outsourced decryption
DOCX
Dynamic audit services for outsourced storages in clouds
DOCX
Attribute aware data aggregation using potential-based dynamic routing n wire...
DOCX
Two tales of privacy in online social networks
DOC
Adaptive position update for geographic routing in mobile ad hoc networks
Anonymization of centralized and distributed social networks by sequential cl...
Pmse a personalized mobile search engine
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Scalable and secure sharing of personal health records in cloud computing usi...
Secure encounter based mobile social networks requirements, designs, and trad...
Efficient rekeying framework for secure multicast with diverse subscription-p...
Cost based optimization of service compositions
Distributed processing of probabilistic top k queries in wireless sensor netw...
Scalable and secure sharing of personal health records in cloud computing usi...
Privacy preserving data sharing with anonymous id assignment
Cross domain privacy-preserving cooperative firewall optimization
Sort a self o rganizing trust model for peer-to-peer systems
Beyond text qa multimedia answer generation by harvesting web information
Attribute based encryption with verifiable outsourced decryption
Dynamic audit services for outsourced storages in clouds
Attribute aware data aggregation using potential-based dynamic routing n wire...
Two tales of privacy in online social networks
Adaptive position update for geographic routing in mobile ad hoc networks
Ad

Similar to A highly scalable key pre distribution scheme for wireless sensor networks (20)

PDF
Research on key predistribution scheme of wireless sensor networks
PPTX
Safest Way of Message or File Transfer using Key Distribution
PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
PDF
Review on key predistribution schemes in wireless sensor networks
PDF
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
PDF
Secure and efficient key pre distribution schemes for wsn using combinatorial...
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PDF
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
PDF
Ijcnc050210
DOCX
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
PDF
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
PDF
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
PPTX
Modelling pairwise key predistribution in the presence of unreliable links
PDF
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
PDF
A key management approach for wireless sensor networks
PDF
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
PDF
A Key Management Approach For Wireless Sensor Networks
PDF
A Key Management Approach For Wireless Sensor Networks
PDF
A Key Management Approach For Wireless Sensor Networks
Research on key predistribution scheme of wireless sensor networks
Safest Way of Message or File Transfer using Key Distribution
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Review on key predistribution schemes in wireless sensor networks
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Ijcnc050210
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
Modelling pairwise key predistribution in the presence of unreliable links
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
A key management approach for wireless sensor networks
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
master seminar digital applications in india
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Classroom Observation Tools for Teachers
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Renaissance Architecture: A Journey from Faith to Humanism
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Basic Mud Logging Guide for educational purpose
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
master seminar digital applications in india
Abdominal Access Techniques with Prof. Dr. R K Mishra
Classroom Observation Tools for Teachers
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Insiders guide to clinical Medicine.pdf
Final Presentation General Medicine 03-08-2024.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx

A highly scalable key pre distribution scheme for wireless sensor networks

  • 1. A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks ABSTRACT: Given the sensitivity of the potential WSN applications and because of resource limitations, key management emerges as a challenging issue for WSNs. One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes to enable a large scale deployment of the network. In this paper, we propose a new scalable key management scheme for WSNs which provides a good secure connectivity coverage. For this purpose, we make use of the unital design theory. We show that the basic mapping from unitals to key pre-distribution allows us to achieve high network scalability. Nonetheless, this naive mapping does not guarantee a high key sharing probability. Therefore, we propose an enhanced unital-based key pre- distribution scheme providing high network scalability and good key sharing probability approximately lower bounded by 1 − e 0.632. We conduct approximate analysis and simulations and compare our solution to those of existing methods for different criteria such as storage overhead, network scalability, network connectivity, average secure path length and network resiliency. Our results show that the proposed approach enhances the network scalability while providing high secure connectivity coverage and overall improved performance.
  • 2. Moreover, for an equal network size, our solution reduces significantly the storage overhead compared to those of existing solutions. EXISTING SYSTEM: Wireless sensor networks (WSNs) are increasingly used in critical applications within several fields including military, medical and industrial sectors. Given the sensitivity of these applications, sophisticated security services are required. Key management is a corner stone for many security services such as confidentiality and authentication which are required to secure communications in WSNs. The establishment of secure links between nodes is then a challenging problem in WSNs. Because of resource limitations, symmetric key establishment is one of the most suitable paradigms for securing exchanges in WSNs. On the other hand, because of the lack of infrastructure in WSNs, we have usually no trusted third party which can attribute pair wise secret keys to neighboring nodes, that is why most existing solutions are based on key pre-distribution. DISADVANTAGES OF EXISTING SYSTEM: A host of research work dealt with symmetric key pre-distribution issue for WSNs and many solutions have been proposed In the existing system many disadvantages occur: the design of key rings (blocks of keys) is strongly related to the network
  • 3. size, these solutions either suffer from low scalability (number of supported nodes), or degrade other performance metrics including secure connectivity, storage overhead and resiliency in the case of large networks. PROPOSED SYSTEM: In this proposed system, our aim is to tackle the scalability issue without degrading the other network performance metrics. For this purpose, we target the design of a scheme which ensures a good secure coverage of large scale networks with a low key storage overhead and a good network resiliency. To this end, we make use, of the unital design theory for efficient WSN key pre-distribution. ADVANTAGES OF PROPOSED SYSTEM: The advantages of the proposed system as follows: We propose a naive mapping from unital design to key pre-distribution and we show through analytical analysis that it allows to achieve high scalability. We propose an enhanced unitalbased key pre-distribution scheme that maintains a good key sharing probability while enhancing the network scalability.
  • 4. We analyze and compare our new approach against main existing schemes, with respect to different criteria: storage overhead, energy consumption, network scalability, secure connectivity coverage, average secure path length and network resiliency. SYSTEM ARCHITECTURE:
  • 5. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above.
  • 6. REFERENCE: Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, and Vahid Tarokh-“ A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”- IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 2, FEBRUARY 2013