Abstract-We investigate the secure connectivity of wireless sensor networks under the random key distribution scheme of Eschenauer and Gligor. Unlike recent work which was carried out under the assumption of full visibility, here we assume a (simplified) communication model where unreliable wireless links are represented as on/off channels. We present conditions on how to scale the model parameters so that the network i) has no secure node which is isolated and ii) is securely connected, both with high probability when the number of sensor nodes becomes large. The results are given in the form of full zero-one laws, and constitute the first complete analysis of the EG scheme under non-full visibility. Through simulations these zero-one laws...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribu...
In wireless sensor networks (WSNs), the Eschenauer–Gligor (EG) key pre-distribution scheme is a wide...
Wireless sensor networks (WSNs) are distributed collections of sensors with limited capabilities for...
Extended version of a paper submitted to ISIT 2008, Toronto (Canada), July 2008.We consider the rand...
The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communica...
We address the problem of connectivity in Secure Wireless Sensor Networks (SWSN) using random pre-di...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
The random key graph is a random graph induced by the random key predistribution scheme of Eschenaue...
Abstract-We give, for the first time, a precise tablishing secure pair-wise communications is very m...
Submitted for inclusion in the program of Infocom 2011, Shanghai (PRC), June 2011In the context of w...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
Sensor Networks has gained increased attention from the security community around the world in the l...
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribu...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribu...
In wireless sensor networks (WSNs), the Eschenauer–Gligor (EG) key pre-distribution scheme is a wide...
Wireless sensor networks (WSNs) are distributed collections of sensors with limited capabilities for...
Extended version of a paper submitted to ISIT 2008, Toronto (Canada), July 2008.We consider the rand...
The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communica...
We address the problem of connectivity in Secure Wireless Sensor Networks (SWSN) using random pre-di...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
The random key graph is a random graph induced by the random key predistribution scheme of Eschenaue...
Abstract-We give, for the first time, a precise tablishing secure pair-wise communications is very m...
Submitted for inclusion in the program of Infocom 2011, Shanghai (PRC), June 2011In the context of w...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
Sensor Networks has gained increased attention from the security community around the world in the l...
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribu...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
We give, for the first time, a precise mathematical analysis of the connectivity and security proper...
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribu...