Generations) are described and their performances are
analyzed and compared to RoK scheme. Both pro-
posed models make use of generations that are as-
signed for future uses. COFRG keeps the offset to the
current generation unchanged. Meanwhile GOFRG
makes jumps towards future in order to increase the
offset to current generation. JUMP parameter defines
the amount of increase in the offset at each generation
in GOFRG. In our simulations, the compromise ra-
tio of GOFRG with JUMP=3 approaches 0.2 where
RoK scheme records more than 0.5 of compromise
ratio. That means, GOFRG shows better resiliency
as compared to RoK. The local connectivity value for
GOFRG with JUMP=3 is around 0.5, whereas this
metric for RoK is around 0.89. However, local con-
nectivity increases in GOFRG for smaller JUMP val-
ues with a cost of reduced resiliency. These analy-
ses indicate a tradeoff between connectivity and re-
siliency in our schemes. This tradeoff is the main dif-
ference between the proposed GOFRG scheme and
RoK.
The COFRG model, which is actually a special
case of GOFRG with zero JUMP, is a baseline for
resiliency in terms of the JUMP parameter. The ad-
vantage of GOFRG is that its deployment window
shifts more than one generation each time, whereas
the deployment window in COFRG shifts one by one.
This small difference makes a big effect throughout
the network life and resiliency significantly drops in
GOFRG. In other words, GOFRG takes the advantage
of time dimension in a better way than COFRG.
The advantage of GOFRG in terms of resiliency
pays off with low connectivity values. This tradeoff
between resiliency and connectivity can be justified
considering that connectivity can be tolerated with
path key establishments, where low resiliency cannot
be cured. We plan to further investigate the time fac-
tor on other key distribution methods proposed in the
literature.
ACKNOWLEDGEMENTS
Omer Z. Yilmaz is supported by TUBITAK, the
Scientific and Technological Research Council of
Turkey. Albert Levi is also supported by TUBITAK
under grant 104E071. We thank Mustafa Yilmaz for
his support in figures.
REFERENCES
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and
Cayirci, E. (2002). Wireless sensor networks: a sur-
vey. Computer Networks, 38(4):393–422.
Anjum, F. (2006). Location dependent key management us-
ing random key-predistribution in sensor networks. In
WiSe ’06: Proceedings of the 5th ACM workshop on
Wireless security, pages 21–30, New York, NY, USA.
ACM.
Camtepe, S. and Yener, B. (2004). Combinatorial design of
key distribution mechanisms for wireless sensor net-
works.
Castelluccia, C. and Spognardi, A. (2007). Rok: A robust
key pre-distribution protocol for multi-phase wireless
sens or networks. In SecureComm2007, Third Inter-
national Conference on Security and Privacy in Com-
munication Networks.
Chan, H. and Perrig, A. (2005). Pike: peer intermedi-
aries for key establishment in sensor networks. In IN-
FOCOM 2005. 24th Annual Joint Conference of the
IEEE Computer and Communications Societies. Pro-
ceedings IEEE.
Dong, Q. and Liu, D. (2007). Using auxiliary sensors for
pairwise key establishment in wsn. In NETWORKING
’07. Ad Hoc and Sensor Networks, Wireless Networks,
Next Generation Internet. Springer Berlin / Heidel-
berg.
Du, W., Deng, J., Han, Y. S., and Varshney, P. K. (2003). A
pairwise key pre-distribution scheme for wireless sen-
sor networks. In CCS ’03: Proceedings of the 10th
ACM conference on Computer and communications
security, pages 42–51, New York, NY, USA. ACM.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In CCS ’02: Proceedings of the 9th ACM conference
on Computer and communications security, pages 41–
47, New York, NY, USA. ACM.
Lu, K., Qian, Y., and Hu, J. (2006). A framework for dis-
tributed key management schemes in heterogeneous
wireless sensor networks. In IPCCC 2006, 25th IEEE
International Performance, Computing, and Commu-
nications Conference.
Mehta, M., Huang, D., and Harn, L. (2005). Rink-rkp:
a scheme for key predistribution and shared-key dis-
covery in sensor networks. In IPCCC ’05, Proc.
24th IEEE Int’l Performance, Computing, and Comm.
Conf.
Yu, Z. and Guan, Y. (2005). A key pre-distribution scheme
using deployment knowledge for wireless sensor net-
works. In IPSN ’05: Proceedings of the 4th interna-
tional symposium on Information processing in sensor
networks, page 35, Piscataway, NJ, USA. IEEE Press.
SECRYPT 2008 - International Conference on Security and Cryptography
144