A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
D Chakrabarti, S Maitra, B Roy - International Journal of Information …, 2006 - Springer
In this paper, combinatorial design followed by randomized merging strategy is applied to
key pre-distribution in sensor nodes. A transversal design is used to construct a (v, b, r, k)
configuration and then randomly selected blocks are merged to form the sensor nodes. We
present detailed mathematical analysis of the number of nodes, number of keys per node
and the probability that a link gets affected if certain number of nodes are compromised. The
technique is tunable to user requirements and it also compares favourably with state of the …
key pre-distribution in sensor nodes. A transversal design is used to construct a (v, b, r, k)
configuration and then randomly selected blocks are merged to form the sensor nodes. We
present detailed mathematical analysis of the number of nodes, number of keys per node
and the probability that a link gets affected if certain number of nodes are compromised. The
technique is tunable to user requirements and it also compares favourably with state of the …
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
D Chakrabarti, S Maitra, B Roy - … , ISC 2005, Singapore, September 20-23 …, 2005 - Springer
In this paper, combinatorial design followed by a probabilistic merging is applied to key pre-
distribution in sensor nodes. A transversal design is used to construct a (v, b, r, k)
configuration and then randomly chosen blocks are merged to form sensor nodes. We
present detailed mathematical analysis of the number of nodes, number of keys per node
and the probability that a link gets affected if certain number of nodes are compromised. The
technique is tunable to user requirements and it also compares favourably with state of the …
distribution in sensor nodes. A transversal design is used to construct a (v, b, r, k)
configuration and then randomly chosen blocks are merged to form sensor nodes. We
present detailed mathematical analysis of the number of nodes, number of keys per node
and the probability that a link gets affected if certain number of nodes are compromised. The
technique is tunable to user requirements and it also compares favourably with state of the …
以上显示的是最相近的搜索结果。 查看全部搜索结果