Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Key Pre-Distribution

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Key Pre-distribution is a scheme to distribute keys onto different sensor nodes prior to deployment. Therefore, these sensor nodes creates network through establishing secured links between different nodes using their shared secret keys after the deployment. A key pre-distribution scheme has three phases: 1) Key Distribution; 2) Shared Key Discovery; 3) Path-key establishment. During these phases, Secret keys are generated and placed in the sensor nodes and then each sensor node in the network looks for the area in its communication range to find other node to communicate. A shared secured link is established when two nodes have at least one common key between them and then communication is happened on that link. After that paths are established by connecting these secured links to create a connected graph. The result is wireless sensor network which perform functions according to key pre-distribution scheme used in the network creation.
Published in Chapter:
An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network
Bhavana Butani (UIT RGPV, India), Piyush Kumar Shukla (UIT RGPV, India), and Sanjay Silakari (UIT RGPV, India)
DOI: 10.4018/978-1-4666-6559-0.ch019
Abstract
Wireless sensor networks are utilized in vital situations like military and commercial applications, traffic surveillance, habitat monitoring, and many other applications. WSNs have to face various issues and challenges in terms of memory, communication, energy, computation, and storage, which require efficient management of huge amount of sensor data. Therefore, storage is an important issue in the WSN. Emergence of Sensor-Cloud infrastructure overcomes several shortcomings of WSN such as storage capacity and offers high processing capabilities for huge sensor data. Security is also the major challenge that is faced by the sensor network. This chapter includes a brief overview of the importance of cloud computing in sensor networks and the goal of DDoS and Node Capture Attack in WSN. This chapter includes descriptions of different modeling techniques of Node Capture attack and various detection and key pre-distribution schemes to invent a new technique to improve network resilience against node capture attacks.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR