15
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.

          Related collections

          Author and article information

          Journal
          03 August 2015
          2015-08-03
          Article
          10.1109/ALLERTON.2014.7028605
          1508.00545
          abbd6092-1db6-42d8-9966-f5250116ccb2

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Full version of a paper published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014
          cs.CR cs.DM cs.IT math.IT math.PR physics.soc-ph

          Comments

          Comment on this article