Top Banner
14

A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

Sep 30, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

Scientia Iranica D (2016) 23(6), 2831{2844

Sharif University of TechnologyScientia Iranica

Transactions D: Computer Science & Engineering and Electrical Engineeringwww.scientiairanica.com

Invited/Review Article

A survey of key pre-distribution and overlay routing inunstructured wireless networks

M. Ghariba, H. Youse�'zadehb;� and A. Movagharc

a. Department of Computer Science, Institute for Research in Fundamental Sciences, Tehran, Iran.b. Center for Pervasive Communications and Computing, University of California, Irvine, USA.c. Department of Computer Engineering, Sharif University of Technology, Tehran, Iran.

Received 4 April 2016; received in revised form 26 April 2016; accepted 17 June 2016

KEYWORDSSecurity;Wireless networks;Cryptography;Key pre-distribution;Overlay routing.

Abstract. Unstructured wireless networks such as mobile ad hoc networks and wirelesssensor networks have been rapidly growing in the past decade. Security is known as achallenging issue in such networks, in which there is no �xed infrastructure or central trustedauthority. Further, node limitations in processing power, storage, and energy consumptionadd further complexity to addressing security in such networks. While cryptography hasproven to be an e�ective solution capable of satisfying most network security requirements,it requires the use of e�cient key pre-distribution algorithms compatible with the limitationof unstructured wireless networks. Typically, a key pre-distribution algorithm forms acryptographic overlay layer above the network routing layer and as such introduces theneed for relying on two layers of routing for secure delivery of information. In this paper,we conduct a categorical review of key pre-distribution methods for unstructured wirelessnetworks. We also compare di�erent key pre-distribution schemes in terms of performanceand security strength. Finally, we provide an overview of recent overlay routing algorithmsrelying on key pre-distribution.© 2016 Sharif University of Technology. All rights reserved.

1. Introduction

Unstructured wireless networks have attracted theattention of many researchers as the result of explosivegrowth in wireless technology. Mobile ad hoc networks(MANETs) and Wireless Sensor Networks (WSNs) areconsidered as the most popular kinds of such net-works. Vehicular ad hoc networks (VANETs), WirelessMesh Networks (WMNs), and Smart Phone Ad hocNetworks (SPANs) are other important examples ofsuch networks. Unstructured wireless networks wereintroduced in the context of US DARPA [1] and

*. Corresponding author. Tel.: +1(949) 824-0380E-mail addresses: [email protected] (M. Gharib);hyouse�@uci.edu (H. Youse�'zadeh); [email protected](A. Movaghar)

PRNET [2] projects in early 1970s. The unstructurednature of such networks combined with their self-organizing properties originally made them attractivefor defense and emergency response applications. Lateron, unique characteristics of unstructured wirelessnetworks expanded their applications into a wide areaof other applications such as WSNs [3], VANETs [4,5],and pervasive computing networks [6]. While thereare many de�nitions for unstructured ad hoc networks,they are all universally considered to have the followingcharacteristics:

� There is no preexisting or �xed infrastructure;� Such networks are dynamic due to mobility and

allowing nodes to join or leave;� Nodes are characterized by limited availability of

resources;

Page 2: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2832 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

� Such networks o�er poor physical security;� Such networks have shared physical transmission

media;� Nodes are typically symmetric in the mentioned

characteristics.

Fast growth of unstructured wireless networkscombined with the entrance into sensitive and vitalapplications such as healthcare, emergency response,and military applications makes security requirementsmuch more signi�cant in such networks. Just likeother networks, unstructured wireless networks need�ve basic security services including con�dential-ity, integrity, authentication, availability, and non-repudiation. Cryptography can o�er all such servicesexcept availability. Availability may be achieved usingother techniques such as Intrusion Detection Systems(IDS). Due to the absence of �xed infrastructure, theuse of traditional key management systems such asPublic Key Infrastructure (PKI) is very challengingand, at times, overhead prohibitive in unstructuredwireless networks. The limitation of resources such asstorage, process, and power in such networks furtherrequires the use of a very e�cient key managementsystem. Hence, key pre-distribution systems appear tobe more e�cient and also more practical for unstruc-tured wireless networks than other key managementsystems. As the cornerstone of cryptosystems, key pre-distribution requires the use of an e�ective two-layerrouting algorithm in its practical implementations.

In the absence of infrastructured key managementsystems, the basic solution is to pre-load all networknodes with the whole set of keys. In this case, thekey pre-distribution algorithm is called naive key pre-distribution. It is worth noting that either pairwisekeys can be used for symmetric cryptosystems or publickeys can be used for asymmetric cryptosystems. Forsymmetric cryptosystems, each node stores one pair-wise key for communicating with each node using naivekey pre-distribution. In asymmetric cryptosystems,each node stores the public key of all other nodes in or-der to be able to communicate with every node directlyand securely. In such cases and when communicatingwith a destination node, a source node �rst encryptsits message with the key of the destination and thensends the message across the physical path. Since themessage is encrypted, only the destination node canread the message.

Since it is not e�cient to store all network keysin each node, it is preferred to store just k keys in eachnode with k << n and n representing the number ofnetwork nodes. In case of naive key pre-distribution,the distributed keys form a fully connected graph inwhich each node has a direct link to all others. Thus,the source node can send a secure message to anyother node directly and securely. In other cases where

the number of stored keys is lower than the numberof network nodes, there may not exist a direct linkbetween the source node and the destination node. Itmeans that the public key of the destination node ora pairwise key between the source and the destinationnode, may not be stored by the source node. Hence,pre-distributed keys form an overlay graph G(E; V ) inwhich V represents the set of network nodes, while Erepresents the set of secure links between nodes. Eachlink e(i;j) 2 E represents a stored pairwise key betweennodes i and j in the case of symmetric cryptosystemsor a public key of node j stored in node i in the caseof asymmetric cryptosystems. Clearly, using key pre-distribution schemes in unstructured wireless networksrequires a more sophisticated routing algorithm appliedto the overlay graph.

Key pre-distribution algorithms are categorizedeither as symmetric versus asymmetric cryptosystemsor as deterministic versus probabilistic schemes. Asymmetric key pre-distribution system is called deter-ministic if there exists at least one shared key betweenevery pair of nodes. Otherwise, it is called probabilis-tic. Key pre-distribution systems are also categorizedas random, polynomial, and combinatorial schemes. Inthis paper, we categorize them from the view pointof overlay routing. Accordingly, key pre-distributionschemes fall into random graph, regular graph, orcombinatorial graph categories. We review the historyand the state of the art of each category and thencompare di�erent algorithms from the perspectives ofperformance and security strength.

The rest of the paper is organized as follows. Pre-liminaries including a brief description of general rout-ing problem using key pre-distribution schemes alongwith important parameters of performance and securitystrength evaluation of key pre-distribution schemes arepresented in Section 2. In Section 3.1, we reviewthe literature of random-graph key pre-distributionschemes. Regular-graph key pre-distribution schemesare reviewed in Section 3.2. Section 3.3 containsa review of combinatorial-graph key pre-distributionschemes. A comparison of di�erent key pre-distributionschemes is o�ered in Section 3.4. Section 4 providesa discussion of deterministic and probabilistic overlayrouting algorithms. Finally, the paper is concluded inSection 5.

2. Preliminaries

In this section, we �rst de�ne the general problem ofrouting for networks that rely on key pre-distributionschemes. Then, we de�ne the most important pa-rameters used in evaluating performance and securitystrength of key pre-distribution schemes. The nota-tions used in this paper are de�ned in Nomenclaturesection.

Page 3: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2833

In case of a symmetric cryptosystem and a keypre-distribution scheme with k < n, the overlay graphG(V;E) is formed including n vertices representingnetwork nodes, i.e. jV j = n. In this graph, there isa bidirectional link between each pair of nodes thatshare at least one common key. In such case, each pairof neighboring nodes can communicate directly andsecurely. Otherwise, a source node has to �nd a securepath in order to communicate with a destination. Forthis reason, the source node �rst uses a standard rout-ing algorithm to �nd a physical path to the destination.Then, each node in the physical path checks whether ithas an overlay link to its next neighbor on the physicalpath. If not, the node �nds an overlay path to itsneighbor. This operation requires sending the list ofstored key IDs to physical neighbors. All nodes on thisso called key-path have to be physically neighboringnodes. The operation of �nding a secure path fromthe source node to the destination node, i.e. �ndinga physical path and then the key-path correspondingto each physical hop, is called key-path establishment.After completing the step of key-path establishment,the source node has a secure path to the destinationnode. Thus, the source node encrypts its message withthe pairwise key agreed with its neighbor. In turn, theneighbor decrypts the message, encrypts it with thepairwise key of next neighbor, and sends the message.Each node does the same until the message reaches thedestination node.

Figure 1 shows an instance of symmetric basedkey pre-distribution routing. In this example, eachnode stores three keys from a key pool containing9 keys, i.e. k1; k2; : : : ; k9. The source node is node

number 1 and the destination node is node number 8.The blue links show the physical path identi�ed usinga typical routing algorithm. It reaches the destinationnode passing through nodes 3, 5, and 7. The redlines show the key-path, i.e., the overlay secure path.Since the source node and node 3 have a shared key,the key-path corresponding to the �rst physical pathhas just one hop. Since nodes 3 and 5 do not havea shared key, node 3 �nds a corresponding key-path.Such key-path passes through nodes 2 and 4 reachingnode number 5. Just like the corresponding key-pathbetween nodes 3 and 5, the key-path between nodes5 and 7 passes through nodes 4 and 6. Since node 7and the destination node have a shared key, the key-path corresponding to the last physical hop includesjust one overlay link. Considering the path from thesource to the destination passes through node 4 twice,it can be argued that such path is not optimal. In thisexample, nodes 3, 2, 4, 5, 6, and 7 decrypt and encryptthe message, and thus they can read the message.Furthermore, the secure path is much longer than thephysical path in the absence of key pre-distributionscheme. The length of the typical unsecured physicalpath is shown using parameter }.

In the case of asymmetric cryptosystems, eachnode stores public keys of k other nodes. Thus, theoverlay graph G(V;E) consists of n vertices and someconnected links. The edge e(i;j) 2 E represents thestored public key of node j in node i. Since storing ofthe public key of node j by node i does not guaranteethat node j stores the public key of node i, the links inoverlay graph are directed.

Using an asymmetric key pre-distribution scheme

Figure 1. An example of overlay routing using symmetric key pre-distribution.

Page 4: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2834 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

requires a di�erent routing algorithm. In this case,the source node has to �nd an overlay path to thedestination node. As the next step, the source nodeencrypts the message with the public key of the �rstoverlay neighbor node and sends the message to it overthe physical path. The physical path can be identi�edusing any standard routing algorithm. The neighbor,in turn, decrypts the message using its private keyand encrypts it again with the next overlay neighbor'spublic key. This operation is repeated until the messagereaches the destination. It is worth noting that unlikesymmetric schemes, in which all nodes participatingin routing are able to read the messages, here, justthe nodes on the overlay path can read the message.Another point of advantage of asymmetric key pre-distribution is related to routing in mobile networksin which overlay paths can stay intact while physicalpaths corresponding to each overlay hop may have tobe changed.

Figure 2 represents an example of asymmetrickey pre-distribution overlay routing. In this example,blue links represent the physical path while directedred links represent the overlay path. Each node storesjust two public keys. As mentioned earlier, the sourcenode �rst �nds the key-path to the destination inthe case of asymmetric key pre-distribution. In thisexample, there are two key-paths srepresented withred arrows. Using di�erent routing algorithms, eachone of the represented key-paths could be chosen. Asthe next step, each node inside the key-path �nds thecorresponding physical path toward the next node. Inthe case of choosing the key-path 1! 2! 3! 6, eachoverlay hop includes just one physical hop. In the othercase, i.e. key-path 1 ! 5 ! 6, the �rst key-path hopincludes four physical hops, i.e. 1 ! 2 ! 3 ! 4 ! 5,

while the second hop includes just one physical hop.It is clear that choosing the �rst key-path decreasesthe physical path length while choosing the otherdecreases the number of decryption-encryption steps.

In both symmetric and asymmetric systems, eachintermediate decryption-encryption step increases thesecurity risk and the probability of an adversary nodecapturing or changing a message. Hence, the number ofintermediate decryption-encryption steps is consideredas a security evaluation parameter. Another securityevaluation parameter is the number of compromisednodes leading to compromising the whole network.This parameter is called resiliency to node capture.It is also observed that using a key pre-distributionscheme with k < n may lead to loss of connectivity inan overlay graph. Hence, the probability of networkconnectivity is another important parameter in thiscontext. It shows the average probability of existenceof a path from a source node to a destination node.Average key-path length is yet another important per-formance evaluation parameter that is directly relatedto the choice of key pre-distribution scheme.

It is observed that a network could be consideredas a two-layer graph under the paradigm of key pre-distribution schemes. While the bottom layer is formedby the physical routing layer, the top layer is a secureoverlay layer formed by key distribution. Hence, thedistribution of keys directly a�ects the performanceand security of the network.

3. A categorical survey of key pre-distributionalgorithms

3.1. Random graph key pre-distributionEschenauer and Gligor propose the original idea of

Figure 2. An example of overlay routing using asymmetric key pre-distribution [32].

Page 5: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2835

random key pre-distribution for unstructured wirelessnetworks [7]. The main idea is to pre-load each nodewith k randomly chosen pairwise keys. Pre-loaded keysare chosen uniformly from a key pool containing Pkeys. A lower value of P leads to a higher probabilityof two nodes sharing at least one key. Using suchkey pre-distribution scheme, each pair of neighboringnodes that share at least one key can communicate witheach other securely. Clearly, the overlay graph formsa random graph in this scheme. Every node discoversits overlay neighbors by broadcasting an identi�er listof its stored keys. Then, each node knows its overlayneighbors and also identi�es the physical neighborsthat do not store its shared key. In the next phase,referred to as path key establishment phase, each node�nds an overlay path to those neighbors with whichit does not have shared keys. The average probabilitythat a shared key exists between two nodes, using theraw idea of random key pre-distribution, is called � andis equal to:

Ln(n)n

+cn:

In this equation, n is the number of network nodeswhile c is a real constant. As mentioned earlier,this value is considered to be a very important per-formance parameter, since it directly a�ects routingperformance. In essence, a higher value of � leads toa shorter overlay path. In �nding a secure path tothe destination, the source node �rst uses a standardrouting algorithm such as AODV and then attemptsat �nding a corresponding key-path for each physicalhop. Trivially, such two-layer routing approach cangenerate signi�cant routing overhead tra�c withoutguaranteeing to identify optimal routing path.

The basic idea of random key pre-distributionhas attracted the attention of researchers due to itsscalability, simplicity, exibility, and usability. Ac-cordingly, many key pre-distribution algorithms areproposed to extend the basic idea proposed by Es-chenauer and Gligor enhancing its performance andsecurity strength. Chan and Perrig [8] propose a q-composite random key pre-distribution. They suggestenhancing the security strength of the basic idea byrequiring a secure connection to be held between thosenodes that have at least q common shared keys. Thepairwise key for secure communication, in this case,is a hash of shared keys. Clearly, such idea enhancessecurity strength but dramatically decreases the prob-ability of the existence of an overlay link between twonodes. Hence, the overlay graph is a random graphwith a much lower number of links leading to muchlonger path lengths. Blom [9] proposes a symmetrickey generation system in which each node needs tostore just (� + 1) keys where � << n in order togenerate a pairwise key with all other nodes directly

and securely in a non-interactive manner. Liu andNing [10] propose to implement the basic idea of [9]and generalize the algorithm to be used as a key pre-distribution scheme. They propose to generate a t-degree bivariate polynomial f(x; y) with the propertyf(x; y) = f(y; x). The polynomial is shown in Eq. (1)where the coe�cients aij 's are chosen randomly anduniformly from the �nite �eld Fq, where q is a primenumber large enough to accommodate a cryptographickey.

f(x; y) =tX

i;j=0

aijxiyj : (1)

Liu and Ning [10] propose to pre-load each node i withits share of polynomial calculated as f(IDi; y) in thenetwork initialization phase. In this case, node i andnode j can communicate with each other securely usingtheir share of polynomial calculated based on the IDof the other node, i.e. the share of node i is equal tof(IDi; y) while the share of node j is f(IDj ; y). Hence,the pairwise key between i and j is f(IDi; IDj) =f(IDj ; IDi). Using such idea, each node needs tostore just one t-degree bivariate polynomial. Since thepolynomial is unique, compromising t + 1 nodes leadto compromising the whole network. On the otherhand, selecting a large value for t translates to a highercomputational overhead. Thus, the value of t is animportant tuning parameter addressing the tradeo�between performance and security. As an extensionof their work and in order to improve security of theiralgorithm, Liu and Ning [10] also propose to form apool with P bivariate polynomials of order t. Eachnode is pre-loaded with k randomly chosen polynomialsfrom the pool. The polynomials are chosen similar towhat is proposed in [7]. Each pair of neighboring nodesstoring a common polynomial are able to communicatewith each other directly and securely. It is worth notingthat each polynomial requires (t + 1) log(q) storagespace.

Du et al. [11] propose a key pre-distributionalgorithm using multiple key spaces instead of a singlekey space proposed in Blom's symmetric key generationsystem [9]. In their extended work of [12], the sameauthors propose a key pre-distribution algorithm thatrequires a lower amount of memory but does not guar-antee the formation of direct links in the overlay layer.The resiliency to node capture in the method of [11,12]is improved in comparison with the original idea of [9].The authors further show that the resiliency of capturein their method is better than those of [7,8] for the sameamount of storage. Gu et al. [13] propose a randomkey pre-distribution scheme based on the work of [7].The authors propose to pre-load di�erent nodes witha di�erent number of keys, i.e. the number of keys isdi�erent among di�erent key rings. Hence, the overlay

Page 6: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2836 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

graph G(V;E) has a higher number of links in a numberof nodes referred to as high-resilience nodes. They alsoprove that assuming the probability of node capture isthe same for all nodes, an attack impact remains thesame in both basic random key pre-distribution schemeof [7] and their heterogeneous scheme of [13]. Theauthors further propose to use high-resilience nodes aspreferred intermediate nodes in the context of routingin order to reduce the overlay path length. It is worthnoting that using such routing algorithms in unstruc-tured wireless networks, especially in WSNs, results infaster consumption of energy in high-resilience nodesand potentially leads to loss of network connectivity.

3.2. Regular graph key pre-distributionSeveral key pre-distribution schemes aim at improvingperformance and security strength of random distribu-tion strategies by using an overlay graph that formsa regular graph. A regular graph [14] is de�ned asa graph in which all vertices have the same numberof connected edges. Bene�ting from the speci�ccharacteristics of a regular graph, di�erent routingstrategies are then proposed. Liu and Ning [10]propose to form an overlay in the shape of an m �mgrid network where m =

pn in which each node is

assigned to a speci�c intersection of the grid. Figure 3shows the arrangement of nine nodes in an m � mgrid according to the method of Liu and Ning [10].Using the algorithm of [10], a pool is �lled with 2mbivariate polynomials categorized into two separategroups called fic(x; y) and fir(x; y) for columns androws, respectively, where i = 0; 1; : : : ;m � 1. Eachnode is pre-loaded with two polynomials accordingto its position in the grid. As an instance, thenode located at the third row and the �fth columnof the grid is pre-loaded with f3

r(x; y) and f5c(x; y).

Interestingly, it is proven that the proposed method

Figure 3. An example of the grid scheme of [10].

of [10] is equivalent to that of [11] utilized by themethod of [12].

Using the key pre-distribution scheme proposedin [12], each node has to follow a routing algorithmin the overlay layer in order to communicate withother nodes. The source node �rst checks whether thedestination node is in the same row or the same columnas its own. If so, they can directly communicate.Otherwise, the source node has to encrypt the messagewith the pairwise key of a node located at its own rowand the same column of the destination, or vice versa.An intermediate node decrypts the message, encryptsit again with the pairwise key of its own and the des-tination node. Clearly, using such algorithm requiresat most one intermediate decryption-encryption step.It is worth noting that the two-dimensional grid-basedalgorithm described here could also be implementedas a higher-dimensional algorithm using a higherdimensional grid. In a higher-dimensional algorithm,the number of stored polynomials are exactly equal tothe number of dimensions.

Later, Liu ei al. [15] proposed a d-dimensionalpolynomial-based key pre-distribution algorithm re-ferred to as hypercube-based key pre-distribution.They propose to assign each node to a speci�c coor-dinate of the hypercube graph. As a result, each nodeis assigned a d-tuple ID, i.e. (j1; � � � ; jd). Denotingthe number of hypercube dimensions as d, the poolcontains d�md�1 randomly generated bivariate poly-nomials where:

m = dpn:

The assignment of polynomials to the nodes followsan algorithm in which each adjacent pair of nodes inthe hypercube have exactly one common polynomial.As such, the overlay network forms a d-dimensionhypercube. To �nd a path from the source to thedestination node, the source node knows the key pathtoward the destination according to its position. Thelength of such path is exactly equal to the Hammingdistance between the source and the destination node.

Chan and Perrig [16] propose Peer Intermediariesfor Key Establishment (PIKE) algorithm in which eachnode stores 2 � (

p(n) � 1) keys. The overlay of this

algorithm forms anp

(n)�p(n) mesh network. Eachnode at this overlay shares a pairwise key with anynode that lies in its row or in its column. Hence,each node can reach other nodes directly or throughat most one intermediate node. Figure 4 shows anexample of PIKE overlay graph for a network with100 nodes. As an instance, in this �gure, node 21shares a pairwise key with each node located at thethird row as well as each node located at the secondcolumn. PIKE overlay appears to be equivalent to 2-dimensional scheme of [10]. The authors of PIKE [16]

Page 7: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2837

Figure 4. An example of PIKE scheme for a networkwith 100 nodes.

further extend their basic idea to form a higher d-dimensional mesh network in which each node has tostore d � ( d

p(n) � 1) keys. In this case, each pair of

nodes located at the same axis store a common pairwisekey. Increasing number of the dimensions decreasesthe memory required for storing keys but increases thenumber of intermediate decryption-encryption steps.

Lee and Stinson [17] propose ID-based one-wayfunction scheme (IOS). They suggest using an overlaygraph referred to as a strongly regular graph withparameters (n; ;�; �). A strongly regular graph withthe mentioned parameters is a loop-free regular graphwith degree and n vertices. Further, each pair of ad-jacent vertices have exactly � common neighbors whileall non-adjacent node pairs have exactly � commonneighbors. Hence, any pair of nodes have either a directlink or exactly � two-hop key-paths.

Delgosha and Fekri [18-20] propose the multi-variate polynomial-based key pre-distribution scheme(MKPS) as an extension of [15]. The basic idea isto generate a virtual d-dimensional hypercube similarto what is proposed in [15]. Then, each node ispositioned in the intersection of di�erent dimensions.Each node is assigned with a d-tuple ID correspondingto the node position. On the other hand, a distinctd-variate polynomial from a set of randomly generatedd-variate polynomials is assigned to every hyperplaneperpendicular to one of the axis lines. Each nodeis pre-loaded with d polynomials corresponding to itsposition, i.e. the intersection of hyperplanes. Eachnode can evaluate each d-variate polynomial at (d �1) dimensions calculating d univariate polynomials.Hence, the storage memory required is exactly the sameas that of [15]. In this case, each pair of adjacentoverlay neighbors whose Hamming distance is equal toone share exactly (d � 1) univariate polynomial. Tocommunicate securely with each other, two neighboringoverlay nodes calculate all (d � 1) shared polynomialsat each other's dimension and generate a pairwise key

as a combination of the (d � 1) generated values. Fora Hamming distance larger than one, the source nodehas to �nd a key-path to reach the destination. It isimportant to note that if the overlay arrangement ofnodes complies with the physical arrangement, then thelongest key-path is equal to d. However, the key-pathcould be much longer since there is no such compliance.The authors of [20] calculate the optimal value of d. Anadversary node needs to compromise (d�1) polynomi-als in comparison with the previous work in which onlyone polynomial is needed to be compromised. The poolcontains d�m d-variate polynomials with m = d

pn for

polynomials of degree t < m.C�amtepe et al. [21] use an expander graph

as the overlay graph in their key pre-distributionscheme. They propose to form Ramanujan expandergraphs [22]. Ramanajun graphs are best known asasymptotically optimal explicit expander graphs pro-viding the highest degree of expansion with the smallestdegree of nodes. In the context of key pre-distribution,the use of such graphs results in achieving a higherdegree of connectivity while storing a smaller numberof keys. Figure 5 shows a Ramanujan expander graphX�;� = X5;17 without showing self-loops and multi-edges. In this example, the graph has � + 1 = 18vertices where each node is of degree � + 1 = 6including the self-loops and multi-edges. The authorsof [21] propose to replace self-loops and multi-edgeswith randomly chosen edges such that each node storesthe same number of keys.

Figure 5. An example of Ramanujan expander graphG(V;E) = X5;17 with 18 nodes where each node has 6neighbors including self-loops and multi-edges. Self-loopsand multi-edges are not shown in the �gure.

Page 8: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2838 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

Gharib et al. [23] propose Probabilistic Asym-metric Key Pre-distribution (PAKP) scheme. Builtbased on asymmetric key cryptosystems, this schemepre-loads each node with k randomly chosen publickeys of other nodes before the network deploymentphase. The scheme is a random graph yet directedoverlay key pre-distribution scheme. Hence, a k-regulardirected graph G(V;E) is formed with jEj = k � n. Inthis graph, each node has k outgoing directed edgeswhile the number of incoming edges is random. Theauthors show that in their scheme, the overlay graph isconnected with a very high probability, even for smallvalues of k. Further, the probability of connectivity isnot signi�cantly a�ected when increasing the numberof network nodes. The authors also prove that the key-path length is in the order O(logk n).

One of the major drawbacks of regular graphkey pre-distribution schemes is that the assumptionof maintaining a perfect regular graph during networklifetime may be violated as the result of random lossof some nodes. As an instance, recall the exampleof Figure 4. Consider nodes 61 and 27 as sourceand destination nodes, respectively. In such case,the connection between source and destination nodespasses through node 67 or node 21. A problem canoccur when both of those nodes go down and, as theresult, there is no overlay path between the source andthe destination nodes.

3.3. Combinatorial key pre-distributionCombinatorial design theory �nds arrangements of sub-sets of a �nite set such that certain characteristics aresatis�ed. Balanced Incomplete Block Design (BIBD)is a combinatorial design methodology used in keypre-distribution schemes due to its special characteris-tics [24]. BIBD arranges v distinct objects in b di�erentblocks. Each object could be considered as a key insidethe key pool while each block represents a key ringof a node. Each BIBD design is represented with aBoolean matrix named incidence matrix, containing vrows and b columns. A special case of BIBD designis represented by matrix (2). In this example, the keypool contains 9 keys equal to the number of incidencematrix rows. The network can have at most 12 nodes,because there are just 12 key rings associated with 12columns. Since the �rst row of the incidence matrixcontains four elements equal to one, the �rst key isshared among four nodes. Moreover, since the �rstcolumn contains three elements equal to one, the �rstnode stores three keys in its key ring. Having theincidence matrix, the overlay graph could be extractedeasily considering each row of incidence matrix. Ineach row, there is a bidirectional link between eachpair of nodes that have an element equal to one inthat row. For instance, considering the �rst row ofthe incidence matrix example of matrix (2), there are

bidirectional links between each pair of nodes 1, 6, 7,and 11 in the overlay graph. The overlay graph couldalso be shown using adjacency matrix. Consideringa network with n nodes, the adjacency matrix is ann � n Boolean matrix in which each element, aij , i.e.the element at the i-th row and j-th column, representswhether there exists a directed link from node i to nodej or not. Since overlay links in combinatorial key pre-distribution schemes are bidirectional, the adjacencymatrix is always a symmetric matrix.26666666666664

1 0 0 0 0 1 1 0 0 0 1 00 0 0 0 0 1 0 1 1 1 0 00 0 1 1 0 0 1 1 0 0 0 01 0 0 1 1 0 0 0 1 0 0 00 0 0 0 1 0 1 0 0 1 0 10 0 1 0 0 0 0 0 1 0 1 10 1 1 0 1 1 0 0 0 0 0 01 1 0 0 0 0 0 1 0 0 0 10 1 0 1 0 0 0 0 0 1 1 0

37777777777775(2)

Each BIBD design is expressed with a quintuplet(v; b; r; k; �) where v and b are the number of objects(keys) and the number of blocks (key rings), respec-tively. Each object is repeated in exactly r distinctblocks and each block contains exactly k objects. Itmeans that r nodes share a key and, further, there areexactly k keys in each key ring. Each pair of distinctobjects occurs together in exactly � blocks. Thus, eachincidence matrix contains v rows and b columns, whereeach row contains exactly r one elements and, further,each column contains exactly k one elements. AnyBIBD design can be expressed with the equivalent tuple(v; k; �) because the relationship bk = vr always holds.

Combinatorial design was �rst used as a keypre-distribution in unstructured wireless networks byC�amtepe and Yener [25] and then extended in [26].The authors of [25,26] propose to use the symmetricdesign of BIBD to ensure full connectivity in overlaynetworks. Thus, their key pre-distribution scheme isa deterministic scheme. Symmetric BIBD design is aBIBD design in which b = v and r = k. De�ned as(q2 + q + 1; q + 1; 1), the proposed design is based onusing a prime power parameter q. It contains q2 +q+1keys and requires each node to store just q + 1 keys.Since � = 1, this design guarantees to have exactly onecommon key for each pair of nodes. In such key pre-distribution method, an attacker can retrieve all keysby compromising just q + 1 nodes and knowing whichnode stores which key ring. An attacker can retrieveall keys by compromising at most q2 + 1 nodes in theabsence of such information. Moreover, such design isnot scalable and as such cannot be used in large-scalenetworks.

A combinatorial trade or bitrade expressed by�(v; k) consists of sets T = fT1; T2g where each Ti

Page 9: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2839

contains � blocks of size k chosen from a �nite setX such that the blocks of T1 are completely disjointfrom the blocks of T2, i.e. T1

TT2 = �. Further,

each set � chosen from X occurs in exactly the samenumber of blocks of T1 as that of T2. The volume oftrade is equal to the number of blocks inside Ti wherejT1j = jT2j. A trade is called Steiner if each set �chosen from X is repeated at most once in any of thesets T1 and T2. Furthermore, such Steiner trade is saidto be strong if any block in T1 and any block in T2intersect with each other in at most two elements. Rujet al. [27] propose a method of constructing StrongSteiner Trades (SSTs) and prove that the proposedconstruction method results in a 2�(qk; k) SSTs with avolume of q2 where q is a prime power number. The setof blocks T1

ST2 represents key rings, each containing

k keys where 4 � k < q and the size of the key pool isqk. Such mapping from SST to key pre-distributioncan generate 2q2 key rings. The authors suggest aproper value for k in the order O(q) = O(

pn) where

n is the number of nodes. According to the proposedalgorithm of [27], two distinct neighboring nodes cancommunicate securely if each one of them is from adi�erent set, T1 or T2, and if they store at least twocommon keys. The pairwise key between node A andnode B is calculated as shown in Eq. (3), where k1 andk2 are the common keys. While SST establishes uniquesecret pairwise keys between nodes, the authors of [28]prove that the probability of sharing such a pairwisekey does not exceed 0:25.

KAB = KBA = hash((k1 � k2)kidAkidB): (3)

Unital design is a special asymmetric case of BIBDdesign. It is based on the value of variable � for whichthe design is represented as (�3+1; �+1; 1) and contains�2(�2 � � + 1) blocks. In the unital design, each blockcontains � + 1 objects and each object is repeated inr = �2 distinct blocks. Since � = 1, each pair of blockshave at most one key in common. Matrix (2) discussedearlier is, in fact, a special case of unital design for� = 2 and a representation of (9; 3; 1).

Bechkit et al. [29] propose a key pre-distributionmethod based on unital design, to which they referas Naive Unital Key Pre-distribution (NU-KP). Theproposed scheme is extended and analyzed in [28]. NU-KP has a low key sharing probability in the orderof O( 1

k ). In order to improve this probability, au-thors suggest pre-loading each node with � completelydisjoint blocks instead of just one block. Thus, thepairwise key between each pair of nodes is the hashvalue of the concatenated common keys. Referred toas �-UKP method, the total number of nodes decreaseto at most b

2 with each distinct pair shared betweenzero to �2 common keys. Increasing the value of � in�-UKP method leads to increasing the probability of

sharing pairwise keys between nodes in the network,but decreasing the security strength of the networkbecause each node receives more keys. Consideringthe �xed size of the key pool, storing more keys ineach node allows an attacker to compromise a smallernumber of nodes in order to retrieve all keys. Forexample, in the unital of matrix (2) and for 2-UKP,each node stores 6 keys out of 9. It means that anattacker needs to compromise just two nodes in order toretrieve all keys. There is also a practical disadvantagein implementing such method due to the di�culty ofdesigning unitals for large values of �.

3.4. A tabular comparison of keypre-distribution schemes

This subsection makes a categorical comparison amongdi�erent key pre-distribution schemes. Table 1 pro-vides a general comparison among di�erent key pre-distribution schemes. Splitting di�erent schemes in3 overlay graph categories, the table covers the typeof overlay graph, storage requirement, connectivityprobability, node capture resiliency, and scalability ofeach scheme. Additional parameters of importance notincluded in the paper are discussed below. The �rstsuch parameter is the mobility support. We note thatschemes built based on symmetric cryptosystems arenot suitable for highly mobile environments. This isbecause high mobility breaks both physical and overlaypaths in such networks. Hence, such systems can onlyperform well in networks with limited mobility. Onthe contrary, asymmetric-based key pre-distributionschemes are more suitable for use in mobile environ-ments as mobility only a�ects connectivity of physicalpaths but not that of overlay paths.

As mentioned earlier, the key-path length isanother parameter directly a�ecting both performanceand security strength of a network. Considering thesecurity aspect, each key-path hop needs an interme-diate decryption-encryption step. The number of in-termediate decryption-encryption steps in symmetric-based key pre-distribution schemes is in the order ofphysical path length, i.e. O(}), while it is in the orderof O(logk n) in asymmetric-based schemes [23].

4. A comparison of overlay routing algorithmsusing key pre-distribution

Overlay routing algorithms are categorized under de-terministic and probabilistic schemes. In deterministicschemes, every node has a direct overlay link to allother nodes. In such schemes, a source node justneeds to �nd the physical routing path to a destination.In [30], Choi proposes a deterministic method using ahash function for key establishment pre-loading eachnode with just n+1

2 keys while ensuring all neighboringnodes have common keys. In deterministic key pre-

Page 10: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2840 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

Table 1. A comparison of key pre-distribution schemes.

Category Scheme Overlaygraph

Storage Connectivityprobability �

Node captureresiliency

Scalability

Random

Eschenauerand Gligor [7]

Random O(k) Ln(n)n + c

n O(nk )Restricted by

comm.overhead

Q-composite [8] Random O(k) O(log(Ln(n)n + c

n )) O(nk )Restricted by

comm.overhead

Liu and Ning [10](Storing k

polynomials)Random O(kt log (q)) Ln(n)

n + cn O(nk )

Restricted bycomm.

overhead

Du et al. [12] Random O(��) 1� e� �2! O( n�� )

Restricted bycomm.

overhead

Gu et al. [13] Random Heterogeneous O(Ln(n)n + c

n ) O (Number of highresilience nodes)

Restricted bycomm.

overhead

Regular

Liu and Ning [10] m�m Grid O(t) O(1=m) O(m) O(m2)Liu et al. [15] Hypercube O(d) O(d= d

pn) O(d) O(md)

PIKE [16]pn�pn Mesh O(

pn) O(1=

pn) O(

pn)

Better thanrandomschemes

IOS [17] Stronglyregular

O( =2) O( =n) O(n= ) O( =2)

MKPS [20] Hypercube O(d) O(d= dpn) O(d) O(md)

C�amtepeet al. [21]

Ramanujanexpander

O(�) �+1�+1 O(�=�) � + 1

PAKP [23] k-Regular O(k) � 1 nRestricted by

comm.overhead

Comninatorial

C�amtepeet al. [26]

Complete O(q) 1 q + 1 O(q2)

SST [27] Non-regular O(k) O(k2=q2) O(q) O(�3)NU-KP [28] Non-regular O(�) O(1=k) O(�2) O(�4)�-UKP [28] Non-regular O(��) (1� e�1) < � O(�2) O(�4)

distribution schemes, each node stores O(n) keys.However, storing a large number of keys is not practicalfor nodes operating in unstructured wireless networksconsidering inherent storage limitations. Furthermore,deterministic schemes do not o�er high resiliencyagainst node capture. The latter is due to the factthat compromising just one node can lead to disclosingmany keys and, consequently, compromising manylinks.

On the other hand, probabilistic key pre-distribution schemes require two layers of routing.Every two-layer routing algorithm has to considerperformance metrics such as path length and security,i.e. the number of intermediate encryption-decryption

steps. In key pre-distribution algorithms operating onrandom or combinatorial graphs, a source node has to�nd the physical path to its destination using a typicalrouting algorithm. As mentioned earlier, each nodealso �nds the key-path to all other nodes. Such key-paths could be identi�ed using any routing algorithm.As a result, a secure path from the source node tothe destination node includes each physical hop's cor-responding key-path. The main di�erentiating factoramong key pre-distribution algorithms operating ona random graph is the probability of having a directlink between an arbitrary pair of nodes. In essence,a higher probability leads to having a shorter path.We remind the reader that using a two-layer routing

Page 11: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2841

algorithm may lead to a non-optimal key-path as notedin the example of Figure 1. It is also worth notingthat using di�erent routing algorithms for �nding thephysical path, and also the corresponding key-path,a�ects network performance.

As discussed in the Section 3.2, di�erent regulargraph-based key pre-distribution schemes require dif-ferent routing algorithms to �nd the key-path corre-sponding to each key's physical hop. In [10], the XYrouting algorithm [31] is used to �nd key-paths afterforming an m �m grid as an overlay graph. The XYrouting algorithm is used for two-dimensional meshnetworks moving packets parallel to the X- and Y -axisuntil delivering them to the destination. The routingalgorithm used for hypercube overlay network of [15]is based on the Hamming distance. This algorithmcalculates the Hamming distance between the sourceand destination node IDs. Accordingly, at each step,a packet moves toward a dimension that shortens theHamming distance. For instance, consider Figure 6,representing a 3-dimensional hypercube with 8 nodes.In this example, nodes ID1 = (1; 0; 0) and ID2 =(0; 0; 1) are source and destination nodes, respectively.The Hamming distance between the mentioned nodesis equal to two-hops because ID1 and ID2 di�er intwo dimensions. Hence, a packet moves from ID1in the direction of the �rst dimension reaching thenode with the ID = (1; 0; 1). In the next step, thepacket moves in the direction of the third dimensionto reach the destination. Since the algorithm of [16]uses an

pn � pn mesh graph as the overlay, it uses

the same XY routing algorithm to �nd the key-pathcorresponding to each physical hop. The algorithmof [20] also uses the same Hamming distance routingalgorithm of [15]. The scheme of [17] forms an overlayusing a strongly regular graph. As mentioned earlier,any pair of nodes that do not have a direct link have

Figure 6. An example of hypercube routing.

exactly � common neighbors. Hence, each pair ofphysical neighbors have a direct key-path or at mosta two hop key-path.

Gharib et al. [32] propose an overlay routing algo-rithm for key pre-distribution schemes with the mainadvantage of being able to jointly optimize the costsof overlay and underlay paths. The other importantadvantage of this algorithm is being agnostic to thechoice of key pre-distribution scheme. In that work, theauthors model a network using a key pre-distributionscheme with a directed and weighted graph. In theirmodel, all vertices and edges have their own costs.The weight of each edge represents the length ofcorresponding physical path in the case of asymmetricschemes and the length of corresponding key-path inthe case of symmetric schemes. Further, a vertexweight represents the cost of decryption-encryptionstep. Considering the directed graph G(V;E) withweighted edges and vertices, a Boolean linear optimiza-tion problem is proposed to �nd the lowest cost pathconsidering both performance and security strength ofthe path. Each node is proposed to store a lookup tablecontaining information about k stored keys where k <<n. The lowest cost solution to the formulated problemis then identi�ed in polynomial time. The limitationof the algorithm is expressed as the time complexityrequired for solving the relaxed LP problems in large-scale networks. The authors show that their algorithmworks well for networks with the sizes of up to 500nodes.

5. Conclusion

In this paper, we conducted a categorical review ofkey pre-distribution methods for unstructured wire-less networks. Key pre-distribution schemes werecategorized into random, regular-graph, and combi-natorial schemes. We also compared di�erent keypre-distribution schemes in terms of performance andsecurity strength. We argued that random schemeswere easier to implement in real world but requiredthe use of e�cient two-layer routing algorithms sincethey did not have any information about distributedkeys. On the contrary, regular graph schemes onlyrequired an e�cient underlay routing algorithm tooperate but often utilized non-e�cient routing paths.Last, we discussed combinatorial schemes which wereeasier to analyze because of their formal design butwere subject to major implementation drawbacks inreal-world networks.

We further provided a categorical overview ofrecent overlay routing algorithms relying on key pre-distribution. Overlay routing algorithms were classi�edunder deterministic and probabilistic schemes. Wenoted that deterministic schemes only needed a singlelayer of routing since every node had a direct overlay

Page 12: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2842 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

link to all other nodes. The drawbacks of deterministicschemes were listed as the storage requirement associ-ated with storing a large number of keys in each nodeand lack of resiliency to node captures. Consequently,probabilistic schemes were introduced as more practicalalternatives of overlay routing capable of addressingboth shortcomings of deterministic schemes at the costof requiring two layers of routing. We then pointed toa recently introduced optimal overlay routing capableof scaling up to about 500 nodes. Improving thescalability of such scheme is the subject of activeresearch.

Nomenclature

n Number of network nodesk Size of a key chainG(V;E) Overlay graphV Set of vertices in G(V;E) representing

network nodesE Set of edges in graph G(V;E)

representing secure linkse(i; j) Link between nodes i and j in graph GP Size of the key pool� Average probability of having an

overlay link between two nodesIDi ID of node i} Unsecured physical path lengthq Large prime number accommodating a

cryptographic keyd Dimension of multi-dimensional graphsm Parameter equal to d

pn

t Bivariate polynomial degree� Number of blocks in UKP� Order of a unital design�; � Parameters of Ramanujan expander

graph! Number of key spaces in multiple key

space schemes� Number of key spaces selected out of !

for use� Number of blocks of each disjoint set

in [27]� + 1 Number of per-node stored keys

in [9,11,12] Degree of a strongly regular graph� Number of common neighbors of each

pair of adjacent nodes in a stronglyregular graph

� Number of common neighbors ofeach pair of non-adjacent nodes in astrongly regular graph

References

1. Toh, C.K., Ad Hoc Wireless Networks: Protocols andSystems, 1st Ed., Upper Saddle River, NJ, USA:Prentice Hall PTR (2001).

2. Haas, Z.J., Deng, J., Liang, B., Papadimitratos, P.and Sajama, S., Wirelessad Hoc Networks, 1st ed. NewYork, NY, USA: In Encyclopedia of Telecommunica-tions, J. Proakis, Ed., John Wiley (2002).

3. Akyildiz, I., Su, W., Sankarasubramaniam, Y. andCayirci, E. \A survey on sensor networks", Commu-nications Magazine, IEEE, 40(8), pp. 102-114, Aug.(2002).

4. Morris, R., Jannotti, J., Kaashoek, F., Li, J. andDecouto, D. \Carnet: A scalable ad hoc wirelessnetwork system", In Proceedings of the 9th Workshopon ACM SIGOPS European Workshop: Beyond thePC: New Challenges for the Operating System, ser. EW9, New York, NY, USA: ACM, pp. 61-65 (2000).

5. Raya, M. and Hubaux, J.-P. \The security of vehicularad hoc networks", In Proceedings of the 3rd ACMWorkshop on Security of Ad Hoc and Sensor Networks,ser. SASN '05, New York, NY, USA: ACM, pp. 11-21(2005).

6. Weiser, M. \The computer for the 21st century",SIGMOBILE Mob. Comput. Commun. Rev., 3(3), pp.3-11, July (1999).

7. Eschenauer, L. and Gligor, V.D. \A key-managementscheme for distributed sensor networks", In Proceed-ings of the 9th ACM Conference on Computer andCommunications Security, ser. CCS '02, New York,NY, USA: ACM, pp. 41-47 (2002).

8. Chan, H., Perrig, A. and Song, D. \Random keypredistribution schemes for sensor networks", In Pro-ceedings of the 2003 IEEE Symposium on Security andPrivacy, ser. SP '03. Washington, DC, USA: IEEEComputer Society, p. 197 (2003).

9. Blom, R. \An optimal class of symmetric key gen-eration systems", In Proc. Of the EUROCRYPT 84Workshop on Advances in Cryptology: Theory andApplication of Cryptographic Techniques, New York,NY, USA: Springer-Verlag, New York, Inc., pp. 335-338 (1985).

10. Liu, D. and Ning, P. \Establishing pairwise keys indistributed sensor networks", in Proceedings of the 10thACM Conference on Computer and CommunicationsSecurity, ser. CCS '03. New York, NY, USA: ACM,pp. 52-61 (2003).

11. Du, W., Deng, J., Han, Y.S. and Varshney, P.K. \Apairwise key predistribution scheme for wireless sensornetworks", In Proceedings of the 10th ACM Conferenceon Computer and Communications Security, ser. CCS'03, New York, NY, USA: ACM, pp. 42-51 (2003).

12. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J.and Khalili, A. \A pairwise key predistribution schemefor wireless sensor networks", ACM Trans. Inf. Syst.Secur., 8(2), pp. 228-258, May (2005).

Page 13: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844 2843

13. Gu, W., Dutta, N., Chellappan, S. and Bai, X. \Pro-viding end-to-end secure communications in wirelesssensor networks", Network and Service Management,IEEE Transactions on, 8(3), pp. 205-218, September(2011).

14. Chen, W.K., Advanced Series in Electrical and Com-puter Engineering, 5th Ed., 5 Toh Tuck Link, Singa-pore: World Scienti�c (1997).

15. Liu, D., Ning, P. and Li, R. \Establishing pairwise keysin distributed sensor networks", ACM Trans. Inf. Syst.Secur., 8(1), pp. 41-77, Feb. (2005).

16. Chan, H. and Perrig, A. \Pike: peer intermediaries forkey establishment in sensor networks", In INFOCOM2005. 24th Annual Joint Conference of the IEEEComputer and Communications Societies, ProceedingsIEEE, 1, March, pp. 524-535 (2005).

17. Lee, J. and Stinson, D. \Deterministic key predistri-bution schemes for distributed sensor networks", InSelected Areas in Cryptography, ser. Lecture Notes inComputer Science, H. Handschuh and M. Hasan, Eds.,Springer Berlin Heidelberg, 3357, pp. 294-307 (2005).

18. Delgosha, F. and Fekri, F. \Key pre-distribution inwireless sensor networks using multivariate polyno-mials", In Sensor and Ad Hoc Communications andNetworks, 2005. IEEE SECON 2005. 2005 SecondAnnual IEEE Communications Society Conference on,pp. 118-129, Sept. (2005).

19. Delgosha, F. and Fekri, F. \Threshold key-establishment in distributed sensor networks usinga multivariate scheme", In INFOCOM 2006. 25thIEEE International Conference on ComputerCommunications, Proceedings, pp. 1-12, April (2006).

20. Delgosha, F. and Fekri, F. \A multivariate key-establishment scheme for wireless sensor networks",Wireless Communications, IEEE Transactions on,8(4), pp. 1814-1824, April (2009).

21. C�amtepe, S., Yener, B. and Y�ung, M. \Expander graphbased key distribution mechanisms in wireless sensornetworks", In Communications, 2006. ICC '06. IEEEInternational Conference on, 5, pp. 2262-2267, June(2006).

22. Lubotzky, A., Phillips, R. and Sarnak, P. \Ramanujangraphs", Combinatorica, 8(3), pp. 261-277 (1988).

23. Gharib, M., Emamjomeh-Zadeh, E., Norouzi-Fard, A.and Movaghar, A. \A novel probabilistic key manage-ment algorithm for large-scale manets", In AdvancedInformation Networking and Applications Workshops(WAINA), 2013 27th International Conference on, pp.349-356, March (2013).

24. Assmus, E.F. and Key, J.D., Designs and Their Codes,1st Ed., New York, NY 10006, USA: CambridgeUniversity Press (1992).

25. C�amtepe, S. and Yener, B. \Combinatorial design ofkey distributionmechanisms for wireless sensor net-works", In Computer Security ESORICS 2004, ser.Lecture Notes in Computer Science, P. Samarati, P.Ryan, D. Gollmann, and R. Molva, Eds., SpringerBerlin Heidelberg, 3193, pp. 293-308 (2004).

26. C�amtepe, S. and Yener, B. \Combinatorial designof key distribution mechanisms for wireless sensornetworks", Networking, IEEE/ACM Transactions on,15(2), pp. 346-358, April (2007).

27. Ruj, S., Nayak, A. and Stojmenovic, I. \Fully securepairwise and triple key distribution in wireless sensornetworks using combinatorial designs", In INFOCOM,2011 Proceedings IEEE, pp. 326-330, April (2011).

28. Bechkit, W., Challal, Y., Bouabdallah, A. and Tarokh,V. \A highly scalable key pre-distribution scheme forwireless sensor networks", Wireless Communications,IEEE Transactions on, 12(2), pp. 948-959, February(2013).

29. Bechkit, W., Challal, Y. and Bouabdallah, A. \Anew scalable key pre-distribution scheme for wsn", inComputer Communications and Networks (ICCCN),2012 21st International Conference on, pp. 1-7, July(2012)

30. Choi, T., Acharya, H.B. and Gouda, M. \The bestkeying protocol for sensor networks", In World ofWireless, Mobile and Multimedia Networks (WoW-MoM), 2011 IEEE International Symposium on, pp.1-6 June (2011).

31. Zhang, W., Hou, L., Wang, J., Geng, S. and Wu,W. \Comparison research between xy and odd-evenrouting algorithm of a 2-dimension 3x3 mesh topologynetwork-on-chip", In Intelligent Systems, 2009. GCIS'09. WRI Global Congress on, 3, pp. 329-333, May(2009).

32. Gharib, M., Youse�'zadeh, H. and Movaghar, A.\Secure overlay routing using key pre-distribution: Alinear distance optimization approach", Mobile Com-puting, IEEE Transactions on, 15(9), pp. 2333-2344(2015).

Biographies

Mohammed Gharib is a Postdoctoral Researcherin the Department of Computer Science, Institutefor Research in Fundamental Sciences (IPM), Tehran,Iran. He received the BS degree from Baghdad Univer-sity of Technology, Iraq, in 2007. He then receivedthe MS and PhD degrees from Sharif University ofTechnology, Tehran, Iran, in 2009 and 2015, respec-tively. In September 2010, he joined Performance andDependability Laboratory (PDL), where he workedtoward his PhD degree, supervised by Professor AliMovaghar, in Computer Engineering Department atSharif University of Technology, Tehran, Iran. Duringthe year 2014, he was a visiting research scholar inCalifornia Institute for Telecommunications and In-formation Technology, University of California Irvine,Irvine. His research interests include mobile adhoc networks, wireless sensor networks, data net-working, peer-to-peer networks, and their securityaspects.

Page 14: A survey of key pre-distribution and overlay routing in ...scientiairanica.sharif.edu/article_3993_3d962e96c4ac7aa69d610aa7… · Wireless networks; Cryptography; Key pre-distribution;

2844 M. Gharib et al./Scientia Iranica, Transactions D: Computer Science & ... 23 (2016) 2831{2844

Homayoun Youse�'zadeh received E.E.E and PhDdegrees from the Department of EE-Systems at Uni-versity of Southern California in 1995 and 1997, re-spectively. Currently, he is an Adjust Professor in theDepartment of EECS at University of California Irvine.In the recent past, he was a Consulting Chief Tech-nologist at the Boeing Company and the founder aswell as Chief Technology O�cer of TierFleet. He is theinventor of several US patents, has published more thanseventy scholarly reviewed articles, and authored morethan twenty design articles associated with deployedindustry products. Dr. Youse�'zadeh is/was with theeditorial board of IEEE Trans. Wireless Communica-tions, IEEE Communications Letters, IEEE WirelessCommunications Magazine, IEEE JSTSP, and Journalof Communications Networks. He was the foundingChairperson of systems' management workgroup ofthe Storage Networking Industry Association and amember of the scienti�c advisory board of IntegratedMedia Services Center at USC. He is a Senior Memberof the IEEE and the recipient of multiple best paper,

faculty, and engineering excellence awards.

Ali Movaghar is a Professor in the Computer En-gineering Department at Sharif University of Tech-nology, Tehran, Iran. He received his BS degree inElectrical Engineering from University of Tehran in1977, and MS and PhD degrees in Computer, Informa-tion, and Control Engineering from the University ofMichigan, Ann Arbor, in 1979 and 1985, respectively.He visited the Institute National de Recherche enInformatique et en Automatique in Paris, France,and the Department of Electrical Engineering andComputer Science at the University of California,Irvine, in 1984 and 2011; worked at AT&T Infor-mation Systems in Napervile, IL, in 1985-1986; andtaught at the University of Michigan, Ann Arbor,in 1987-1989. His research interests include perfor-mance/dependability modeling and formal veri�cationof wireless networks and distributed real-time sys-tems. He is a Senior Member of the IEEE and theACM.