given by Ruj and Roy in [8] and by Dong, Pei and Wang in [9] , which had not been
presented in these papers. The algorithms run in O(1) and O(sqrt[3]N) respectively.
Also communication requires at most O(log
√
N) bits, where N is the size of the net-
work. Randomized key predistribution algorithms lack efficient key management strate-
gies because there is no underlying pattern. The efficient key establishment strategies of
deterministic schemes as given in this paper motivates us to use deterministic schemes
for key predistribution. We are working towards devising algorithms for shared key dis-
covery for other known key predistribution schemes. One interesting problem will be to
design efficient key establishment schemes for randomized key predistribution schemes.
References
1. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryp-
tography and rsa on 8-bit cpus. In Joye, M., Quisquater, J.J., eds.: CHES. Volume 3156 of
Lecture Notes in Computer Science., Springer (2004) 119–132
2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In
Atluri, V., ed.: ACM Conference on Computer and Communications Security, ACM (2002)
41–47
3. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks.
In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2003) 197–
4. Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for
distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11
(2008)
5. C¸ amtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless
sensor networks. In Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R., eds.: ESORICS.
Volume 3193 of Lecture Notes in Computer Science., Springer (2004) 293–308
6. Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor net-
works. In Handschuh, H., Hasan, M.A., eds.: Selected Areas in Cryptography. Volume 3357
of Lecture Notes in Computer Science., Springer (2004) 294–307
7. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor
networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005,
New Orleans, LA, USA. (2005)
8. Ruj, S., Roy, B.K.: Key predistribution using partially balanced designs in wireless sensor
networks. In Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F.,
eds.: ISPA. Volume 4742 of Lecture Notes in Computer Science., Springer (2007) 431–445
9. Dong, J., Pei, D., Wang, X.: A key predistribution scheme using 3-designs. In: INSCRYPT.
(2007)
10. Chakrabarti, D., Maitra, S., Roy, B.K.: A key pre-distribution scheme for wireless sensor
networks: Merging blocks in combinatorial design. In Zhou, J., Lopez, J., Deng, R.H., Bao,
F., eds.: ISC. Volume 3650 of Lecture Notes in Computer Science., Springer (2005) 89–103
11. Stinson, D.: Combinatorial Designs: Constructions and Analysis. Springer-Verlag, New
York (1987)
12. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor net-
works using deployment knowledge. IEEE Trans. Dependable Sec. Comput. 3 (2006) 62–77
77