The diameter of a cycle plus a random matching
SIAM Journal on Discrete Mathematics
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Semi-Direct Product in Groups and Zig-Zag Product in Graphs: Connections and Applications
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
A combinatorial construction of almost-ramanujan graphs using the zig-zag product
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Unreliable sensor grids: coverage, connectivity and diameter
Ad Hoc Networks
ACM Transactions on Sensor Networks (TOSN)
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks
Wireless Communications & Mobile Computing - Quality of Service and Security in Wireless and Mobile Networks
Connectivity optimization for wireless sensor networks applied to forest monitoring
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes
ACM Transactions on Sensor Networks (TOSN)
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Secure communication in Wireless Sensor Networks (WSNs) necessitates utilisation of efficient key distribution mechanisms. Several works using probabilistic, deterministic, and hybrid methods have been conducted to address key distribution among nodes. In this paper, we propose a method to distribute key-chains utilising expander graphs based on the Zig-Zag product. Given a set of constraints such as network size, storage, and radio range, we are able to construct a resilient key distribution graph. The main advantage of the obtained method is attaining a shorter key-path length compared with previously proposed approaches. Simulation results demonstrate the efficiency of the proposed method.