Abstract
Combinatorial designs are very effective tools for managing keys in an infrastructure where power and memory are two major constraints. None of the present day wireless technologies takes the advantage of combinatorial designs. In this paper, we have proposed a general framework using combinatorial designs which will enable the participating devices to communicate securely among themselves with little memory and power overhead. The scheme caters for different kinds of user requirements and allows the designer to choose different combinatorial designs for different parts or levels of the network. This general framework will find application in all wireless radio technologies, typically WPANs and WLANs. This is a hitherto unexplored technique in wireless technologies.
Chapter PDF
References
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Chakrabarti, D., Maitra, S., Roy, B.: A key pre-distribution scheme for wireless sensor networks: Merging blocks in combinatorial design. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 89–103. Springer, Heidelberg (2005)
Chakrabarti, D., Maitra, S., Roy, B.: A hybrid design of key pre-distribution scheme for wireless sensor networks. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol. 3803, pp. 228–238. Springer, Heidelberg (2005)
Chakrabarti, D., Maitra, S., Roy, B.: Clique size in sensor networks with key pre-distribution based on transversal design. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds.) IWDC 2005. LNCS, vol. 3741, pp. 329–337. Springer, Heidelberg (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)
Klaus, C.W.: Internet Security Systems (ISS). Wireless LAN Security FAQ. (accessed on: January 17, 2006), http://www.iss.net/wireless/WLAN_FAQ.php
Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs. CRC Press, Boca Raton (1996)
Du, W., Ding, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireles sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security, ACM CCS 2003, pp. 42–51 (2003)
Eschenauer, L., Gligor, V.B.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security, ACM CCS 2002, pp. 41–47 (2002)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Kahn, J.M., Katz, R.H., Pister, K.S.J.: Next century challenges: Mobile networking for smart dust. In: Proceedings of the 5th annual ACM/IEEE international conference on mobile computing and networking, pp. 483–492 (1999)
Lam, C.W.H.: The search for a finite projective plane of order 10. Amer. Math. Monthly 98, 305–318 (1991)
Lee, J.-Y., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Lee, J., Stinson, D.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Computing and Networking Conference (WCNC 2005), New Orleans, LA, USA, 13–17 March (2005)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security, ACM CCS 2003 (2003)
Man, M.: Bluetooth and Wi-Fi: Understanding these two technologies and how they can benefit you. (accessed on: January 17, 2006), http://www.socketcom.com/pdf/TechBriefWireless.pdf
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), Seattle, WA, pp. 39–50 (June 2005)
Stinson, D.R.: Combinatorial Designs: Constructions and Analysis. Springer, New York (2003)
Street, A.P., Street, D.J.: Combinatorics of Experimental Design. Clarendon Press, Oxford (1987)
Projective Plane. accessed on: (January 17, 2006), http://mathworld.wolfram.com/ProjectivePlane.html
http://searchsmb.techtarget.com/sDefinition/0,sid44_gci540859,00.html , (accessed on: January 17, 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chakrabarti, D., Seberry, J. (2006). Combinatorial Structures for Design of Wireless Sensor Networks. In: Zhou, J., Yung, M., Bao, F. (eds) Applied Cryptography and Network Security. ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767480_25
Download citation
DOI: https://doi.org/10.1007/11767480_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34703-3
Online ISBN: 978-3-540-34704-0
eBook Packages: Computer ScienceComputer Science (R0)