O'Reilly logo

Public-key Cryptography: Theory and Practice by C. E. Veni Madhavan, Abhijit Das

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

B.4. The Basic Random Key Predistribution Scheme

The paper [88] by Eschenauer and Gligor is a pioneering research on bootstrapping in sensor networks. Their scheme, henceforth referred to as the EG scheme, is essentially the basic bootstrapping method just described.

The key set-up server starts with a pool of randomly generated keys. The number M of keys in is taken to be a small multiple of the network size n. For each sensor node u to be deployed, a random subset of m keys from is selected and given to u as its key ring. Upon deployment, each ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required