BIROn - Birkbeck Institutional Research Online

Distinct difference configurations: multihop paths and key predistribution in sensor networks

Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions on Information Theory 56 (8), pp. 3961-3972. ISSN 0018-9448.

[img]
Preview
Text (Post-print (refereed))
2907.pdf

Download (537Kb) | Preview
Official URL: http://dx.doi.org/10.1109/TIT.2010.2050794

Abstract

A distinct difference configuration is a set of points in Z2 with the property that the vectors (difference vectors) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the k-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of k or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the k-hop coverage of a distinct difference configuration with m points, and exploit a connection with Bh sequences to construct configurations with maximal k-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.

Item Type: Article
Additional Information: "(c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works."
Keyword(s) / Subject(s): Data security, key predistribution, wireless sensor networks
School or Research Centre: Birkbeck Schools and Research Centres > School of Business, Economics & Informatics > Economics, Mathematics and Statistics
Depositing User: Administrator
Date Deposited: 08 Dec 2010 10:03
Last Modified: 17 Apr 2013 12:33
URI: http://eprints.bbk.ac.uk/id/eprint/2907

Archive Staff Only (login required)

Edit/View Item Edit/View Item