Resilient and secure wireless sensor network under non-full visibility
- PDF / 3,224,943 Bytes
- 12 Pages / 595.276 x 790.866 pts Page_size
- 5 Downloads / 166 Views
REGULAR PAPER
Resilient and secure wireless sensor network under non‑full visibility Bhupendra Gupta1 · Jyoti Pandey1 Received: 10 May 2018 / Accepted: 26 November 2019 © China Computer Federation (CCF) 2019
Abstract Connectivity, resilient and unsplittability are the essential requirements of any wireless sensor network (WSN). Connectivity ensures that the complete network is a single component and there exists at least one path between any two nodes, while resilient and unsplittability ensures that the network remains connected even if a linear proportion of the nodes were compromised by the adversary. In this work we consider a wireless sensor network induced by kryptograph with non-full visibility condition. We derive a threshold for transmission range above which the WSN becomes connected almost surely. We also derive threshold conditions to show resilience and unsplittability of connected sensor networks in an almost sure sense and provided simulated experiments in support of our claims. Keywords Wireless sensor networks · Secure wireless communication · Key pre-distribution scheme
1 Introduction Wireless sensor networks (WSNs) have emerged as promising technology with a wide range of potential uses and applications, including environmental monitoring, building surveillance, and military applications. A WSN is a pool of spatially distributed sensor nodes. Generally, these sensor nodes are deployed randomly and do not depend on predefined network architecture. Also, these sensor nodes having limited resources like storage capacity and power supply, it requires optimal use of these resources for the necessary computational activities and the communication between the sensor nodes. To achieve these goal sensor nodes must communicate via the collaborative peer-to-peer random network. Sometimes the environment of deployment of the WSN is hostile in nature, where sensor nodes are always under the threat to capture or being compromised by the adversary, also the communications between the sensor nodes are under observation. An adversary can interrupt communications among sensor nodes, and disturb operations by propagation bogus information in the WSN. A malicious adversary can disrupt the network operations by intercepting the communication between the sensor nodes and by * Bhupendra Gupta [email protected] 1
propagating false information. In this situation, we need to secure WSN in which the communication between the sensor nodes can be accessed by the other authentic and authorized sensor nodes in the WSN. We use random key predistribution scheme (RKP) within WSN to achieve secure communication between the nodes. As the classical cryptographic techniques, like Kerberos (Neuman and Ts’o 1994) and Internet Engineering Task Force (1999), are impractical and not applicable to achieve the security in WSNs, because of these techniques involves a lot of computation and hence a lot of CPU use, while in WSNs we have limited computational resources. The random key pre-distribution scheme (RKP), is one of the
Data Loading...