18.02.2014 Views

wireless ad hoc networking

wireless ad hoc networking

wireless ad hoc networking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

144 Wireless Ad Hoc Networking<br />

(KDC). Every sensor verifies the authenticity of the list using the KDC’s public<br />

key. It then removes keys in the revocation list from its key ring. The<br />

revocation does not take extra storage. If the number of revoked sensors is<br />

big, the connectivity of the network may degr<strong>ad</strong>e significantly. In this case,<br />

the central controller can initiate rekeying and restore the connectivity of<br />

the network. Since sensors being compromised is a rare event, it can be<br />

expected that only after a long time, a network needs rekeying.<br />

Another type of key predistribution is the key space approach. Inste<strong>ad</strong> of<br />

relying on independent key sets, a key space approach uses some mathematical<br />

space definition, which we will discuss later. Two types of key<br />

spaces have been proposed. The first type is based on a matrix. The second<br />

type is based on a bivariate polynomial. Both key space schemes exhibit<br />

a threshold property. There exists a positive constant λ. When there are<br />

less than λ compromised sensors, the rest of the network is still perfectly<br />

secure. But once λ sensors are compromised, all the links in the network<br />

are no longer secure.<br />

The storage and computation overhe<strong>ad</strong> of key space approaches are<br />

proportional to λ. In a large sensor network, using the key space scheme is<br />

not scalable due to a possible larger number of sensors being compromised.<br />

To make the key space approach scalable and still preserve the threshold<br />

property, both schemes propose to use multiple key spaces. The multiple<br />

key spaces approach is the combination of the key space approach and random<br />

key predistribution. In the multiple key spaces approach, each sensor<br />

is randomly assigned a set of key spaces. So each sensor can establish a<br />

secure connection with any other sensor sharing the same key space.<br />

Since any two sensors within the same key space can establish a secure<br />

connection, the connectivity of the multiple key spaces approach is on the<br />

same level with that of random key predistribution. However, because of<br />

the threshold property, compromising a few sensors no longer affects any<br />

other part of the network.<br />

The matrix-based key space is based on the following idea. First, a primitive<br />

element s from a finite field GF (q) is chosen, where q is the smallest<br />

prime larger than the key size. The following matrix G of size (λ + 1) × N<br />

is generated:<br />

⎡<br />

⎤<br />

1 1 1 ... 1<br />

s s 2 s 3 ... s N<br />

G =<br />

s 2 (<br />

s<br />

2 ) 2 (<br />

s<br />

3 ) 2 (<br />

... s<br />

N ) 2<br />

⎢<br />

⎥<br />

⎣<br />

.<br />

s λ (<br />

s<br />

2 ) λ (<br />

s<br />

3 ) λ (<br />

... s<br />

N ) ⎦<br />

λ<br />

The jth column of G, which is denoted by G(j), is distributed to<br />

sensor j. The key distribution center also generates ω random symmetric<br />

matrices D 1 , D 2 , ..., D ω of size (λ + 1) × (λ + 1). Then each tuple

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!