Skip to main content
Erschienen in: Wireless Networks 4/2021

07.05.2021 | Original Paper

A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network

verfasst von: Neda Solari Esfehani, Hamid Haj Seyyed Javadi

Erschienen in: Wireless Networks | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Currently, IoT is being used as a novel tool in many applications. Some applications use the end nodes such as wireless sensor network, RFID and embedded systems referred to as resource-constrained devices. These devices have limitations in computing and communication power, memory capacity and power. One of the approaches to discuss key distribution in these devices is to apply and use key pre-distribution schemes (KPSs) as a lightweight solution. Also, the combinatorial designs application in key pre-distribution has been considered as a suitable method due to the low overhead in the shared key discovery phase between devices. This paper assessed the combinatorial designs used in key pre-distribution, and then, compared these designs using KPSs evaluation metrics. Finally, by tabulating all the considered key pre-distribution methods in a comparison table, it was stated that all of these methods could be used in different applications depending on their strengths.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.CrossRef Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Networks, 141, 199–221.CrossRef
2.
Zurück zum Zitat Nikoletseas, S., & Rolim, J. D. P. (2011). Theoretical aspects of distributed computing in sensor networks. Springer. ISBN: 0387954872, Chapter 24. Nikoletseas, S., & Rolim, J. D. P. (2011). Theoretical aspects of distributed computing in sensor networks. Springer. ISBN: 0387954872, Chapter 24.
3.
Zurück zum Zitat Modiri, V., Javadi, H. H. S., & Anzani, M. (2017). A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96, 2821–2841.CrossRef Modiri, V., Javadi, H. H. S., & Anzani, M. (2017). A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96, 2821–2841.CrossRef
4.
Zurück zum Zitat Eschenauer, L., & Gligor, V. D. (2002). A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM. Eschenauer, L., & Gligor, V. D. (2002). A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47). ACM.
5.
Zurück zum Zitat Chan, H., & Perrig, A. (2003). Random key pre-distribution schemes for sensor networks. In Proceedings of the 2003 IEEE symposium on security and privacy (SP 03) (pp. 197–213). IEEE. Chan, H., & Perrig, A. (2003). Random key pre-distribution schemes for sensor networks. In Proceedings of the 2003 IEEE symposium on security and privacy (SP 03) (pp. 197–213). IEEE.
6.
Zurück zum Zitat Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.CrossRef Qian, S. (2012). A novel key pre-distribution for wireless sensor networks. Physics Procedia, 25, 2183–2189.CrossRef
7.
Zurück zum Zitat Li, W. S., Tsai, C. W., Chen, M., Hsieh, W. S., & Yang, C. S. (2013). Threshold behavior of multi-path random key pre-distribution for sparse wireless sensor networks. Mathematical and Computer Modeling, 57(11), 2776–2787.MathSciNetCrossRef Li, W. S., Tsai, C. W., Chen, M., Hsieh, W. S., & Yang, C. S. (2013). Threshold behavior of multi-path random key pre-distribution for sparse wireless sensor networks. Mathematical and Computer Modeling, 57(11), 2776–2787.MathSciNetCrossRef
8.
Zurück zum Zitat Catakoglu, O., & Levi, A. (2013). Uneven key pre-distribution scheme for multi-phase wireless sensor networks. In E. Gelenbe & R. Lent (Eds.), Information sciences and systems (pp. 359–368). Springer. Catakoglu, O., & Levi, A. (2013). Uneven key pre-distribution scheme for multi-phase wireless sensor networks. In E. Gelenbe & R. Lent (Eds.), Information sciences and systems (pp. 359–368). Springer.
9.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Computer Science Department, Technical Report-TR-05-07. Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Computer Science Department, Technical Report-TR-05-07.
10.
Zurück zum Zitat Blom, R. (1984). An optimal class of symmetric key generation systems. In Advances in cryptology: Proceedings of Eurocrypt 84, lecture notes in computer science (Vol. 209, pp. 335–338). Springer. Blom, R. (1984). An optimal class of symmetric key generation systems. In Advances in cryptology: Proceedings of Eurocrypt 84, lecture notes in computer science (Vol. 209, pp. 335–338). Springer.
11.
Zurück zum Zitat Chien, H. Y., Chen, R. C., & Shen, A. (2008). Efficient key pre-distribution for sensor nodes with strong connectivity and low storage space. In Proceedings of the 2nd international conference on advanced information networking and applications (AINA08), GinoWan, Okinawa, Japan (pp. 327–333). IEEE. Chien, H. Y., Chen, R. C., & Shen, A. (2008). Efficient key pre-distribution for sensor nodes with strong connectivity and low storage space. In Proceedings of the 2nd international conference on advanced information networking and applications (AINA08), GinoWan, Okinawa, Japan (pp. 327–333). IEEE.
12.
Zurück zum Zitat Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly secure key distribution for dynamic conferences. In Advances in cryptology: CRYPTO 92. LNCS (Vol. 740, pp. 471–486). Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly secure key distribution for dynamic conferences. In Advances in cryptology: CRYPTO 92. LNCS (Vol. 740, pp. 471–486).
13.
Zurück zum Zitat Wang, N. C., & Chen, H. L. (2013). Improving pairwise key pre-distribution in wireless sensor networks. In R. S. Chang, L. C. Jain, & S. L. Peng (Eds.), Advances in intelligent systems and applications, Hualien (Vol. 1, pp. 521–530). Springer. Wang, N. C., & Chen, H. L. (2013). Improving pairwise key pre-distribution in wireless sensor networks. In R. S. Chang, L. C. Jain, & S. L. Peng (Eds.), Advances in intelligent systems and applications, Hualien (Vol. 1, pp. 521–530). Springer.
14.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In P. Samarati, P. Y. A. Ryan, D. Gollmann, & R. Molva (Eds.), ESORICS, lecture notes in computer science (Vol. 3193, pp. 293–308). Springer. Camtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. In P. Samarati, P. Y. A. Ryan, D. Gollmann, & R. Molva (Eds.), ESORICS, lecture notes in computer science (Vol. 3193, pp. 293–308). Springer.
15.
Zurück zum Zitat Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE wireless communications and networking conference (WCN’ 05) (Vol. 2, pp. 1200–1205). IEEE Communication Society. Lee, J., & Stinson, D. (2005). A combinatorial approach to key pre-distribution for distributed sensor networks. In IEEE wireless communications and networking conference (WCN’ 05) (Vol. 2, pp. 1200–1205). IEEE Communication Society.
16.
Zurück zum Zitat Ruj, S., & Roy, B. (2007). Key pre-distribution using partially balanced designs in wireless sensor networks. In Proceedings of the 5th international conference on parallel and distributed processing and applications, Niagara Falls, Canada, Aug 29-31 (pp. 431–445). Ruj, S., & Roy, B. (2007). Key pre-distribution using partially balanced designs in wireless sensor networks. In Proceedings of the 5th international conference on parallel and distributed processing and applications, Niagara Falls, Canada, Aug 29-31 (pp. 431–445).
17.
Zurück zum Zitat Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.MathSciNetCrossRef Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.MathSciNetCrossRef
18.
Zurück zum Zitat Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.CrossRef Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(2), 948–959.CrossRef
19.
Zurück zum Zitat Yuan, Q., Ma, C., Yu, H., & Bian, X. (2018). A key pre-distribution scheme based on \(\mu\)-PBIBD for enhancing resilience in wireless sensor networks. Sensors, 18, 1539.CrossRef Yuan, Q., Ma, C., Yu, H., & Bian, X. (2018). A key pre-distribution scheme based on \(\mu\)-PBIBD for enhancing resilience in wireless sensor networks. Sensors, 18, 1539.CrossRef
20.
Zurück zum Zitat Bahrami, P. N., Javadi, H. H., Dargahi, T., Dehghantanha, A., & Choo, K. R. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776.CrossRef Bahrami, P. N., Javadi, H. H., Dargahi, T., Dehghantanha, A., & Choo, K. R. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776.CrossRef
22.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.CrossRef Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.CrossRef
23.
Zurück zum Zitat Lee, J., & Stinson, D. R. (2005). Deterministic key pre-distribution schemes for distributed sensor networks. In Selected areas in cryptography, Kingston (pp. 294–307). Springer. Lee, J., & Stinson, D. R. (2005). Deterministic key pre-distribution schemes for distributed sensor networks. In Selected areas in cryptography, Kingston (pp. 294–307). Springer.
24.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. Journal of ACM/IEEE Transactions on Networking, 15(2), 346–358.CrossRef Camtepe, S. A., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. Journal of ACM/IEEE Transactions on Networking, 15(2), 346–358.CrossRef
25.
Zurück zum Zitat Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key pre-distribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.CrossRef Chakrabarti, D., Maitra, S., & Roy, B. (2006). A key pre-distribution scheme for wireless sensor networks: Merging blocks in combinatorial design. International Journal of Information Security, 5(2), 105–114.CrossRef
26.
Zurück zum Zitat Kavitha, T., & Sridharan, D. (2012). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141. Kavitha, T., & Sridharan, D. (2012). Hybrid design of scalable key distribution for wireless sensor networks. IACSIT International Journal of Engineering and Technology, 2(2), 136–141.
27.
Zurück zum Zitat Dargahi, T., Javadi, H. H. S., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.CrossRef Dargahi, T., Javadi, H. H. S., & Hosseinzadeh, M. (2015). Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. Security and Communication Networks, 8(8), 1561–1574.CrossRef
28.
Zurück zum Zitat Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of things. Ad Hoc Networks, 32, 17–31.CrossRef Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of things. Ad Hoc Networks, 32, 17–31.CrossRef
29.
Zurück zum Zitat Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key pre-distribution schemes for sensor networks. Design, Codes and Cryptography, 71(3), 433–457.CrossRef Paterson, M. B., & Stinson, D. R. (2014). A unified approach to combinatorial key pre-distribution schemes for sensor networks. Design, Codes and Cryptography, 71(3), 433–457.CrossRef
30.
Zurück zum Zitat Bose, M., Dey, A., & Mukerjee, R. (2013). Key pre-distribution schemes for distributed sensor networks via block designs. Design, Codes and Cryptography, 67(1), 111–136.CrossRef Bose, M., Dey, A., & Mukerjee, R. (2013). Key pre-distribution schemes for distributed sensor networks via block designs. Design, Codes and Cryptography, 67(1), 111–136.CrossRef
31.
Zurück zum Zitat Henry, K. J., Paterson, M. B., & Stinson, D. R. (2014). Practical approaches to varying network size in combinatorial key pre-distribution schemes. In Selected areas in cryptography (SAC) 2013, number 8282 in lecture notes in computer science (pp. 89–117). Springer. Henry, K. J., Paterson, M. B., & Stinson, D. R. (2014). Practical approaches to varying network size in combinatorial key pre-distribution schemes. In Selected areas in cryptography (SAC) 2013, number 8282 in lecture notes in computer science (pp. 89–117). Springer.
32.
Zurück zum Zitat Stinson, D. R. (2003). Combinatorial designs: Construction and analysis. Springer, ISBN: 0387954872. Stinson, D. R. (2003). Combinatorial designs: Construction and analysis. Springer, ISBN: 0387954872.
33.
Zurück zum Zitat Anderson, I. (1990). Combinatorial designs: Construction methods. Ellis Horwood.MATH Anderson, I. (1990). Combinatorial designs: Construction methods. Ellis Horwood.MATH
34.
Zurück zum Zitat Yağan, O., & Makowski, A. M. (2016). Wireless sensor networks under the random pairwise key pre-distribution scheme: Can resiliency be achieved with small key rings? IEEE/ACM Transactions on Networking, 24(6), 3383–3396.CrossRef Yağan, O., & Makowski, A. M. (2016). Wireless sensor networks under the random pairwise key pre-distribution scheme: Can resiliency be achieved with small key rings? IEEE/ACM Transactions on Networking, 24(6), 3383–3396.CrossRef
35.
Zurück zum Zitat Eletreby, R., & Yağan, O. (2018). Connectivity of wireless sensor networks secured by the heterogeneous random pairwise key pre-distribution scheme. In Proceedings of IEEE conference on decision and control (CDC), 2018. IEEE. Eletreby, R., & Yağan, O. (2018). Connectivity of wireless sensor networks secured by the heterogeneous random pairwise key pre-distribution scheme. In Proceedings of IEEE conference on decision and control (CDC), 2018. IEEE.
36.
Zurück zum Zitat Zhao, J. (2017). Topological properties of wireless sensor networks under the q-composite key pre-distribution scheme with unreliable links. IEEE/ACM Transactions on Networking, 25(3), 1789–1802.CrossRef Zhao, J. (2017). Topological properties of wireless sensor networks under the q-composite key pre-distribution scheme with unreliable links. IEEE/ACM Transactions on Networking, 25(3), 1789–1802.CrossRef
37.
Zurück zum Zitat El Hajjar, A., Roussos, G., & Paterson, M. (2016). On the performance of key pre-distribution for RPL-based IoT networks. In N. Mitton, H. Chaouchi, T. Noel, T. Watteyne, A. Gabillon, & P. Capolsini (Eds.), Interoperability, safety and security in IoT (pp. 67–78). Springer. El Hajjar, A., Roussos, G., & Paterson, M. (2016). On the performance of key pre-distribution for RPL-based IoT networks. In N. Mitton, H. Chaouchi, T. Noel, T. Watteyne, A. Gabillon, & P. Capolsini (Eds.), Interoperability, safety and security in IoT (pp. 67–78). Springer.
38.
Zurück zum Zitat Kolagar, Q., Javadi, H. H. S., & Bijani, S. (2017). A deterministic multiple key space scheme for wireless sensor networks via combinatorial designs. Journal of Communication Engineering, 6(1), 53–70. Kolagar, Q., Javadi, H. H. S., & Bijani, S. (2017). A deterministic multiple key space scheme for wireless sensor networks via combinatorial designs. Journal of Communication Engineering, 6(1), 53–70.
39.
Zurück zum Zitat Lee, J., & Stinson, D. R. (2008). On the construction of practical key pre-distributoin schemes for distributed sensor networks. Journal of ACM Transactions on Information and Systems Security, 11(2), 1–35.CrossRef Lee, J., & Stinson, D. R. (2008). On the construction of practical key pre-distributoin schemes for distributed sensor networks. Journal of ACM Transactions on Information and Systems Security, 11(2), 1–35.CrossRef
40.
Zurück zum Zitat Anzani, M., Javadi, H. H. S., & Modiri, V. (2017). Key management scheme for wireless sensor networks based on merging blocks of symmetric design. Wireless Networks, 24, 1–13.CrossRef Anzani, M., Javadi, H. H. S., & Modiri, V. (2017). Key management scheme for wireless sensor networks based on merging blocks of symmetric design. Wireless Networks, 24, 1–13.CrossRef
41.
Zurück zum Zitat Javanbakht, M., Erfani, H., Javadi, H. H. S., & Daneshjoo, P. (2014). Key pre-distribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs. Security and Communication Networks, 7, 2003–2014.CrossRef Javanbakht, M., Erfani, H., Javadi, H. H. S., & Daneshjoo, P. (2014). Key pre-distribution scheme for clustered hierarchical wireless sensor networks based on combinatorial designs. Security and Communication Networks, 7, 2003–2014.CrossRef
42.
Zurück zum Zitat Lee, J., & Stinson, D. R. (2006). Common intersection designs. Journal of Combinatorial Designs, 14(4), 251–269.MathSciNetCrossRef Lee, J., & Stinson, D. R. (2006). Common intersection designs. Journal of Combinatorial Designs, 14(4), 251–269.MathSciNetCrossRef
43.
Zurück zum Zitat Dong, J., Pei, D., & Wang, X. (2008). A key pre-distribution scheme based on \(3\)-designs. In Information security and crptography, lecture notes in computer science (Vol. 4990, pp. 81–92). Dong, J., Pei, D., & Wang, X. (2008). A key pre-distribution scheme based on \(3\)-designs. In Information security and crptography, lecture notes in computer science (Vol. 4990, pp. 81–92).
44.
Zurück zum Zitat Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.CrossRef Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.CrossRef
45.
Zurück zum Zitat Kolagar, I. Q., Javadi, H. H. S., & Anzani, M. (2017). Hypercube bivariate-based key management for wireless sensor networks. Journal of Sciences, Islamic Republic of Iran, 28(3), 273–285.MathSciNet Kolagar, I. Q., Javadi, H. H. S., & Anzani, M. (2017). Hypercube bivariate-based key management for wireless sensor networks. Journal of Sciences, Islamic Republic of Iran, 28(3), 273–285.MathSciNet
46.
Zurück zum Zitat Dong, J. W., Pei, D. Y., & Wang, X. L. (2008). A class of key pre-distribution schemes based on orthogonal arrays. Journal of Computer Science and Technology, 23(5), 825–831.MathSciNetCrossRef Dong, J. W., Pei, D. Y., & Wang, X. L. (2008). A class of key pre-distribution schemes based on orthogonal arrays. Journal of Computer Science and Technology, 23(5), 825–831.MathSciNetCrossRef
47.
Zurück zum Zitat Bush, K. A. (1952). Orthogonal arrays of index unity. The Annals of Mathematical Statistics, 23(3), 426–434.MathSciNetCrossRef Bush, K. A. (1952). Orthogonal arrays of index unity. The Annals of Mathematical Statistics, 23(3), 426–434.MathSciNetCrossRef
48.
Zurück zum Zitat Pang, S. Q., & Chen, L. Y. (2017). Generalized latin matrix and construction of orthogonal arrays. Acta Mathematicae Applicatae Sinica, 33(4), 1083–1092.MathSciNetCrossRef Pang, S. Q., & Chen, L. Y. (2017). Generalized latin matrix and construction of orthogonal arrays. Acta Mathematicae Applicatae Sinica, 33(4), 1083–1092.MathSciNetCrossRef
49.
Zurück zum Zitat Pang, S. Q., Xu, W. J., Chen, G. Z., & Wang, Y. (2018). Construction of symmetric and asymmetric orthogonal arrays of strength \(t\) from orthogonal partition. Indian Journal of Pure and Applied Mathematics, 49(4), 663–669.MathSciNetCrossRef Pang, S. Q., Xu, W. J., Chen, G. Z., & Wang, Y. (2018). Construction of symmetric and asymmetric orthogonal arrays of strength \(t\) from orthogonal partition. Indian Journal of Pure and Applied Mathematics, 49(4), 663–669.MathSciNetCrossRef
50.
Zurück zum Zitat Gao, Q., Ma, W. P., & Li, X. P. (2017). A key pre-distribution scheme based on mixed-level orthogonal arrays. Ad Hoc & Sensor Wireless Networks, 37, 53–69. Gao, Q., Ma, W. P., & Li, X. P. (2017). A key pre-distribution scheme based on mixed-level orthogonal arrays. Ad Hoc & Sensor Wireless Networks, 37, 53–69.
51.
Zurück zum Zitat Gao, Q., Ma, W. P., & Luo, W. (2018). Key pre-distribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Networks, 73, 40–50.CrossRef Gao, Q., Ma, W. P., & Luo, W. (2018). Key pre-distribution schemes for wireless sensor networks based on combinations of orthogonal arrays. Ad Hoc Networks, 73, 40–50.CrossRef
54.
Zurück zum Zitat Ruj, S., & Roy, B. (2008). Key pre-distribution schemes using codes in wireless sensor networks. In Information security and cryptology (pp. 275–288). Springer. Ruj, S., & Roy, B. (2008). Key pre-distribution schemes using codes in wireless sensor networks. In Information security and cryptology (pp. 275–288). Springer.
55.
Zurück zum Zitat Sarkar, P., Saha, A., & Chowdhury, M. U. (2010). Secure connectivity model in wireless sensor networks (WSN) using first order Reed–Muller codes. In 2010 IEEE 7th International conference on mobile adhoc and sensor systems (MASS) (pp. 507–512). IEEE. Sarkar, P., Saha, A., & Chowdhury, M. U. (2010). Secure connectivity model in wireless sensor networks (WSN) using first order Reed–Muller codes. In 2010 IEEE 7th International conference on mobile adhoc and sensor systems (MASS) (pp. 507–512). IEEE.
56.
Zurück zum Zitat Hui, K. (2011). Secure communication of wireless sensor network (WSN) using coding theory. International Journal of Computer Networks and Communications Security, 1, 342–346. Hui, K. (2011). Secure communication of wireless sensor network (WSN) using coding theory. International Journal of Computer Networks and Communications Security, 1, 342–346.
57.
Zurück zum Zitat Dalai, D. K., & Sarkar, P. (2017). Sensornet: A key pre-distribution scheme for distributed sensors using nets. In SENSORNETS (pp. 49–58). Dalai, D. K., & Sarkar, P. (2017). Sensornet: A key pre-distribution scheme for distributed sensors using nets. In SENSORNETS (pp. 49–58).
Metadaten
Titel
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
verfasst von
Neda Solari Esfehani
Hamid Haj Seyyed Javadi
Publikationsdatum
07.05.2021
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-021-02629-8

Weitere Artikel der Ausgabe 4/2021

Wireless Networks 4/2021 Zur Ausgabe

Neuer Inhalt