great advantage over many other schemes. Although
sensornet suffers from lack of full connectivity, it is
very close to full connectivity for large size of par-
tial spread. Moreover, the generic computations in
Section 5.4 establish that connectivity of sensornet is
good (either direct or 1−hop path connectivity), it is
preferable to have full connectivity or at least a de-
terministic path in case of 1−hop connectivity. The
sophisticated MB designs of (Bag et al., 2012; Dhar
and Sarkar, 2011) establishes a deterministic 1−hop
connectivity for the Reed Solomon code based KPS
(Ruj and Roy, 2008). These heavily design dependent
works can certainly open the doors for future research
by considering similar constructions over sensornet in
place of other combinatorial design based schemes.
REFERENCES
Bag, S., Dhar, A., and Sarkar, P. (2012). 100% connectivity
for location aware code based kpd in clustered wsn:
Merging blocks. In Information Security Conference,
ISC 2012, number 7483 in Lecture Notes in Computer
Science, pages 136–150. Springer-Verlag.
Blom, R. (1985). An optimal class of symmetric key gener-
ation systems. In Advances in Cryptology - Eurocrypt
1984, number 209 in Lecture Notes in Computer Sci-
ence, pages 335–338. Springer-Verlag.
Bose, M., Dey, A., and Mukerjee, R. (2013). Key pre-
distribution schemes for distributed sensor networks
via block designs. Design, Codes and Cryptography,
67(1):111–136.
Bu, T. (1980). Partitions of a vector space. Discrete Math-
ematics, 31:79–83.
C¸ amtepe, S. A. and Yener, B. (2004). Combinatorial design
of key distribution mechanisms for wireless sensor
networks. In 9th European Symposium on Research
Computer Security, ESORICS 2004, number 3193 in
Lecture Notes in Computer Science, pages 293–308.
Springer-Verlag.
C¸ amtepe, S. A. and Yener, B. (2005). Key distribution
mechanisms for wireless sensor networks: a sur-
vey. Technical report, Rensselaer Polytechnic In-
stitute. Available at www.cs.rpi.edu/research/pdf/05-
07.pdf.
C¸ es¸melio
˘
glu, A., Meidl, W., and Pott, A. (2015). Bent func-
tions, spreads, and o-polynomials. SIAM Journal of
Discrete Mathematics, 29(2):854–867.
Chen, C. Y. and Chao, H. C. (2011). A survey of key pre-
distribution in wireless sensor networks. Security and
Communication Networks, 7(12).
Dhar, A. and Sarkar, P. (2011). Full communication in a
wireless sensor network by merging blocks of a key
predistribution using reed solomon code. In Proceed-
ings of CCSEA 2011, CS & IT 02, pages 389–400.
Dong, J. W., Pei, D. Y., and Wang, X. L. (2011). A class
of key predistribution schemes based on orthogonal
arrays. Journal of Computer Science and Technology,
23:825–831.
Eisfeld, J. and Storme, L. (2000). (partial) t-spreads and
minimal t-covers in finite projective spaces. In Lec-
ture notes for the Socrates Intensive Course on Finite
Geometry and its Applications, University of Ghent.
Erd
˝
os, P. and R
´
enyi, A. (1960). On the evolution of random
graphs. Publication of the Mathematical Institute of
the Hungarian Academy of Sciences.
Eschenauer, L. and Gligor, V. (2002). A key-management
scheme for distributed sensor networks. In Proceed-
ings of 9th ACM conference on computer and commu-
nications security, pages 41–47. ACM press.
Henry, K. J., Paterson, M. B., and Stinson, D. R. (2014).
Practical approaches to varying network size in com-
binatorial key predistribution schemes. In Selected
Areas in Cryptography (SAC) 2013, number 8282 in
Lecture Notes in Computer Science, pages 89–117.
Springer-Verlag.
Johnson, N. L. (2010). Combinatorics of Spreads and Par-
allelisms. CRC Press.
Johnson, N. L., Jha, V., and Biliotti, M. (2007). Handbook
of Finite Translation Planes, volume 289 of Pure and
Applied Mathematics. Chapman & Hall/CRC.
Lee, J. and Stinson, D. R. (2004). Deterministic key pre-
distribution schemes for distributed sensor networks.
In Selected Areas in Cryptography (SAC) 2004, num-
ber 3357 in Lecture Notes in Computer Science, pages
294–307. Springer-Verlag.
Lee, J. and Stinson, D. R. (2005). A combinatorial approach
to key predistribution for distributed sensor networks.
In IEEE Wireless Communications and Networking
Conference, WCNC-2005, pages 1200–1205.
Lee, J. and Stinson, D. R. (2008). On the construc-
tion of practical key predistribution schemes for dis-
tributed sensor networks using combinatorial designs.
ACM Transactions on Information and System Secu-
rity, 11(2):854–867.
Lidl, R. and Niederreiter, H. (1997). Finite fields. Ency-
clopaedia of mathematics and its applications. Cam-
bridge University Press.
Lu, H. Y. (2008). Partial spreads and hyperbent functions
in odd characteristic. Master’s thesis, Simon Fraser
University.
Paterson, M. B. and Stinson, D. R. (2014). A unified ap-
proach to combinatorial key predistribution schemes
for sensor networks. Design, Codes and Cryptogra-
phy, 71(3):433–457.
Ruj, S. and Pal, A. (2016). Preferential attachment model
with degree bound and its application to key predistri-
bution in WSN. In IEEE Conference on Advanced In-
formation Networking and Applications, AINA 2016,
pages 677–683.
Ruj, S. and Roy, B. K. (2008). Key predistribution schemes
using codes in wireless sensor networks. In Informa-
tion Security and Cryptology, Inscrypt 2008, number
5487 in Lecture Notes in Computer Science, pages
275–288. Springer-Verlag.
Wei, R. and Wu, J. (2004). Product construction of key
distribution schemes for sensor networks. In Selected
Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets
57