Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Key Predistribution

Advances in Malware and Data-Driven Network Security
It is one of the phase of the key management in which the cryptographic keys are created by the key distribution server. The generated keys should be collusion resistant.
Published in Chapter:
Fruit Fly Optimization-Based Adversarial Modeling for Securing Wireless Sensor Networks (WSN)
Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India), Mukul Goyal (National Institute of Technology, Kurukshetra, India), Rishabh Sethi (National Institute of Technology, Kurukshetra, India), and Nitish Gupta (National Institute of Technology, Kurukshetra, India)
Copyright: © 2022 |Pages: 17
DOI: 10.4018/978-1-7998-7789-9.ch012
Abstract
Node capture attack is one of the crucial attacks in wireless sensor networks (WSN) that seizes the node physically and withdraws the confidential data from the node's memory. The chapter exploits the adversarial behavior during a node capture to build an attack model. The authors also propose a fruit fly optimization algorithm (FFOA) that is a multi-objective optimization algorithm that consists of a number of objectives for capturing a node in the network: maximum node contribution, maximum key contributions are some examples of the same. The aim is to demolish the maximum part of the network while minimizing the cost and maximizing attacking efficiency. Due to the multi-objective function, the authors attain a maximum fraction of compromised traffic, lower attacking rounds, and lower energy cost as contrasted with other node capture attack algorithms. They have developed an algorithm, which is an enhanced version of FFOA and has even better efficiency than FFOA.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Scalable Rekeying Using Linked LKH Algorithm for Secure Multicast Communication
It is one of the phases of key management where keys are generated either in centralized manner or distributed manner and distributed to valid nodes of the network.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR