BIROn - Birkbeck Institutional Research Online

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S.R. and Etzion, T. and Martin, K.M. and Paterson, Maura B. (2010) Distinct difference configurations: multihop paths and key predistribution in sensor networks. IEEE Transactions on Information Theory 56 (8), pp. 3961-3972. ISSN 0018-9448.

    Text (Post-print (refereed))

    Download (550kB) | Preview


    A distinct difference configuration is a set of points in Z2 with the property that the vectors (difference vectors) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the k-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of k or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the k-hop coverage of a distinct difference configuration with m points, and exploit a connection with Bh sequences to construct configurations with maximal k-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application.


    Item Type: Article
    Additional Information: "(c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works."
    Keyword(s) / Subject(s): Data security, key predistribution, wireless sensor networks
    School: Birkbeck Faculties and Schools > Faculty of Science > School of Computing and Mathematical Sciences
    Depositing User: Administrator
    Date Deposited: 08 Dec 2010 10:03
    Last Modified: 09 Aug 2023 12:30


    Activity Overview
    6 month trend
    6 month trend

    Additional statistics are available via IRStats2.

    Archive Staff Only (login required)

    Edit/View Item Edit/View Item