title page
Abstract
Contents
List of Abbreviations 13
List of Notations 14
Chapter 1. Introduction 15
1.1. Wireless Sensor Networks 15
1.2. Our Contribution 16
1.3. Organization of the thesis 18
Chapter 2. Preliminaries 19
2.1. WSN Background 19
2.1.1. Overview 19
2.1.2. Key Definitions of WSN 20
2.1.3. WSN Applications 22
2.1.4. Security Threats To A WSN 22
2.1.5. WSN Operational Paradigms 25
2.1.6. Obstacles of WSN Security 28
2.2. Related Works 31
2.2.1. Eschenauer et al.'s Scheme 32
2.2.2. Chan et al.'s Scheme 33
2.2.3. Pairwise Key Establishment Scheme 34
2.2.4. Location-Based Key Management Scheme 36
2.2.5. Drawbacks of Previous Scheme 37
Chapter 3. Our Proposed Scheme 39
3.1. Main Idea 39
3.2. Modeling of Pre-Deployment Knowledge 40
3.2.1. Classification of States 40
3.2.2. Active-State Group(ASG) 41
3.3. Lifetime of WSN 43
3.4. Design of Key Pre-Distribution Scheme 44
3.4.1. Key Pre-Distribution Phase 44
3.4.2. Shared-Key Discovery Phase 45
3.4.3. Path-Key Establishment Phase 46
3.5. Setting up KPs 46
Chapter 4. Analysis and Evaluation 49
4.1. Evaluation Metrics 49
4.2. Analysis of Connectivity 50
4.3. Analysis of Resilience against Node Capture 53
4.4. Analysis of Memory Usage 54
4.5. Application of Proposed Scheme 55
Chapter 5. Conclusion 57
[국문요약] 58
References 60
Acknowledgements 63
Curriculum Vitae 64
3.1. Useful Sleep States for WSNs 40
4.1. Memory Usage for each sensor node 54
2.1. Overview of Wireless Sensor Networks 19
2.2. Example of Redundant Key Assignments in WSNs 38
3.1. Probability Distribution of active-probability for each ASG 43
3.2. Key Pre-Distribution Phase 44
3.3. Shared-Key Discovery Phase 45
3.4. Path-Key Establishment Phase 46
3.5. Shared keys between neighboring KPs 47
4.1. Connectivity 52
4.2. Resilience Against Node Capture: ps=0.33 and ps=0.50(이미지참조) 53
4.3. ps vs. a under different values of |S| and L 56