Determining parameters of key predistribution schemes via linear codes in wireless sensor networks

  • Authors:
  • Qi Chen;Dingyi Pei;Junwu Dong

  • Affiliations:
  • College of Mathematics and Information Science, Guangzhou University, Guangzhou, China;College of Mathematics and Information Science, Guangzhou University, Guangzhou, China;College of Mathematics and Information Science, Guangzhou University, Guangzhou, China

  • Venue:
  • Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In INSCRYPT 2008, Ruj and Roy proposed deterministic key predistribution schemes using codes. Particularly, they used Reed Solomon codes to present key predistribution schemes. They calculate the connectiviey and resiliency of the network when the schemes are based on Reed Solomon codes. However, the connectivity and resiliency of the network for the schemes using other codes haven't been calculated so far. In the present paper, we will determine the key parameters of predistribution schemes via linear codes in wireless sensor networks. We calculate the connective probability, the probability fail(1) and the upper bound of the fraction of links broken when s nodes are compromised. We use the theory of matroid. We find that it is very surprising that these parameters can be calculated by making use of the chromatic polynomial of the matroid associated to the codes used in the resulting schemes.