GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks

Limited capabilities of tiny sensor node make it difficult to build a secure wireless sensor network. To cope with this problem, location-aware key predistribution schemes have been studied but without considering irregularity of real sensing fields. They were designed for ideal sensing fields divided into uniform regular polygons but false is the real sensing field, where we face irregular obstacles, undulations, and boundaries. In this paper, we tackle this problem from practical sense and first introduce the general deployment model, comparable to the previous uniform deployment model. To construct a secure WSN in the general deployment model, we present a new framework called GenDep, which consists of two phases: group placement and key management. In the group placement phase, we find an optimal position for sensor groups so that both connectivity and global coverage are satisfied for secure communications. In the key management phase, we devise a new structure called extended groups to partition the whole deployment area into irregular subareas. GenDep can build secure and flexible WSNs by using the existing key predistribution schemes even designed in the uniform deployment model. To ensure practicality of GenDep, we also conduct rigorous analysis and simulation in this paper.


Introduction
Wireless sensor networks (WSNs) play an important role in mission critical applications, such as military systems, healthcare services, and industrial systems.In such applications, security is a crucial requirement.Unfortunately, it is quite challenging to construct secure WSNs because tiny sensor nodes are very constrained in the capacity of computation, communications, storage, and power management.In particular, key management, which is the most fundamental part of security mechanisms, must be considered in the design phase of WSN with regard to the limited capabilities of tiny sensor nodes.
Since Eschenauer and Gligor have introduced the first proposal [1], a variety of approaches have been studied for secure key management based on the key predistribution concept [2][3][4][5][6][7].Among them, location-aware key management schemes [5][6][7] were remarkable in their efficiency in terms of computation and communication costs (Section 2.1).Indeed, the efficiency came from the preknowledge of the location that helps sensor nodes share secret keys effectively with their (likely) adjacent nodes.However, previous approaches are unrealistic.(1) The previous deployment models assumed a sensing field to be a flat area that is dividable into uniform, regular grids.Such a uniform deployment model is, however, far from the real sensing field, which is actually not uniform in its geographical features and so highly inefficient.(2) The previous location-aware key management schemes are not applicable to a general deployment model, which covers various geographic features in the real sensing field.Their target application is so limited; nonuniform density was not allowed for placing the sensor nodes (Section 2.2).
To cope with these problems in this paper, we first present the general deployment model for WSNs and then propose a new location-aware key management framework called GenDep so as to be effective in that model.We can summarize our contribution as follows.
2 International Journal of Distributed Sensor Networks (i) We present the general deployment model (Section 3).
We address that the conventional uniform models are unrealistic because geographical features are irregular in the real world.The general deployment model relaxes the constraints of sensing fields and implements the conceptual WSNs to be practical.
(ii) On the general deployment model, we construct the new framework called GenDep that actually enables practical location-aware key management.GenDep consists of two phases.First, in the group placement phase (Section 4), we find optimal positions of sensor groups by fulfilling the requirements of WSN applications and geographical features.After placing groups of sensor nodes, we partition a whole sensing field into a number of nonuniform polygons, called zones.Second, in the key management phase (Section 5), we can employ the existing key predistribution schemes (even designed in the uniform deployment model) for our general deployment model.To do so, we devise a new structure of extended groups, each of which consists of a pair of adjacent zones.The extended groups are organized for every pair of zones; thus they overlap each other and connect all neighbors.We treat every extended group as an independent group.Therefore, we can employ any key predistribution scheme for each extended group.
(iii) We evaluate GenDep via numerical analyses and simulations (Section 6).In particular, the numerical analyses handle connectivity, security, and storage overhead of sensor nodes with general probability distributions.

Related Work
Sensor Node Placement.Previous studies on the node placement have focused on how to place a sensor node at an optimal location individually.Meguerdichian et al. addressed the coverage problem in WSN [8].They calculated the maximum breach path and the maximum service path of nodes to find a position that maximizes coverage.In [9], Zou and Chakrabarty introduced a greedy algorithm called virtual force algorithm (VFA).VFA assumes targets have virtual attractive forces and obstacles have virtual repulsive forces.
Sensor nodes can find their position under the influence of the forces.Zou and Chakrabarty [10] also proposed setting a virtual backbone from active nodes to improve coverage and connectivity in ad hoc networks.Takahara et al. [11] evaluated the coverage of sensors deployed in the grid pattern for uniform and normal errors.Wang et al. [12] proposed a deployment strategy when sensors are deployed in Gaussian distribution without concerns on the connectivity.Recently, interesting researches have been carried out to enhance coverage in mixed WSNs, which has the heterogeneous setting of static and mobile nodes.Ghosh and Das presented a good survey on the coverage and connectivity issues in [13].
Static sensor nodes are arranged to maximize the coverage (blanket/barrier coverage of [13]) and mobile sensor nodes move carefully to fill the coverage holes (sweep coverage).Lambrou and Panayiotou proposed collaborative scheme to improve coverage in mixed sensor networks [14,15].In particular, considering the tradeoff between coverage and energy consumption (communication), they pursue an autonomous sensor system to improve coverage effectively by mobile sensor nodes.Emphasizing the role of mobile sensor nodes for coverage, Das and Roy presented an algorithm to maximize coverage with continuous movement of sensor nodes in [16].The proposed algorithm lets the mobile sensor nodes cover the sensing field fully within a fixed time.[18].They modeled sensor nodes along curved lines to enhance the suboptimal coverage of linebased coverage.To sum up, the previous researches focused on placing individual sensor nodes effectively and achieved their goal.However, in large-scale WSNs, where sensors are deployed in groups, we have to take into account group placement.In that sense, GenDep focuses on placing sensor groups rather than individual sensor nodes.
Key Management in Wireless Sensor Networks.In [1], Eschenauer and Gligor proposed a random key predistribution (RKP) scheme for WSNs.A randomly selected subkey pool is preinstalled to each node before deployment.Chan et al. enhanced RKP (-composite RKP, qRKP).qRKP achieves better resilience by restricting the minimum number of shared keys to connect.They also proposed the randompairwise key scheme (RP) in [19], where RP selects a random pair and gives a pairwise key.In [3] [21].Grid-based predeployment knowledge on location is used to preinstall the hybrid keys to sensor nodes.Our previous work improves the connectivity in key management with perfect resilience via the key offering method [22].

Problems.
Previous location-aware approaches [2,3,5,6] assume the uniform deployment model, where a sensing field is a flat area with a uniform geographical feature.In real world, however, a target sensing field is nonuniform.We hardly meet the ideal sensing field that fits to the uniform deployment model.Furthermore, the real-world field has irregular geographical features.The WSN applications also have different sensing interests.Of course we can apply the uniform deployment model to the real-world field by force but it must be extremely inefficient.Figure 1 shows an example of the real-world sensing field.Suppose that we would like to install WSN for a plain field only (not on the mountain and lake).We cannot make an optimal design to partition the sensing field with grids.To provide a practical WSN for real-world sensing fields, we should be able to divide the sensing field into any polygons like the dotted lines.

GenDep Overview
In this section, we overview the proposed method, GenDep, which is a novel location-aware key management scheme in the general deployment model.The detailed explanations on GenDep will be given in later sections, Sections 4 and 5.

General Deployment Model.
Large-scale WSNs benefit from group-based deployment, that is, placing sensors by the unit of a group [23], for their scalability.Since sensor groups should be placed in a fixed pattern, however, the uniform deployment model is not appropriate for large-scale WSNs in the real world.To cope with this impracticality, we present the general deployment model.Any form of deployment area can be used for group-based deployment by dividing it into nonuniform subareas, which the existing uniform deployment model cannot support.The general deployment model relaxes the constraints and resolves this problem.Unfortunately, the previous location-aware key management schemes have been considered in the uniform model only, and so they are not quite workable in the general model.It is desirable to develop a new location-aware key management method in the general deployment model.

GenDep Framework.
The new method proposed in this paper is called GenDep.In the general deployment model, GenDep divides and assigns subareas in irregular form to sensor groups and performs location-aware key management effectively.
Figure 2 illustrates the basic procedure of GenDep.Given the information of a sensing field and application requirements in the general deployment model, we firstly define the sensing requirements, which imply the required density of sensors at a particular point.We then apply GenDep in two phases as follows.
(i) Phase 1: in this phase, we make a group placement plan by finding optimal positions of "sensor groups." We first set reference points according to the sensing requirements and then set deployment points of sensor groups based on the reference points.Finally, we adjust the planned location and distribution of sensor groups so as to enhance the intergroup connectivity.(ii) Phase 2: in this phase, we preinstall key sets and conduct location-based key establishment in the general deployment model.We first build group structures incorporating zones and extended groups.Second, we preinstall key sets to every sensor node so as to deploy sensor groups to the target sensing field according to the group placement plan.Finally, after the real deployment, all the sensor nodes conduct pairwise key establishment.

Group Placement (Phase 1)
The group-based deployment phase consists of three steps: (1) setup reference points, (2) setup deployment points, and (3) adjust distributions.Notations section summarizes the notations to be used in this paper.

4.1.
Step 1: Setup Reference Points.In this step, we set reference points according to the sensing requirements.First of all, we represent a target sensing field as a two-dimensional Cartesian plane and place reference points (, ), as illustrated in Figure 3(a).The reference points are the points that hold sensing requirements at their position and are placed by following the uniform distribution.Note that they are not actual deployment points but only used for deriving local sensing requirements based on the prior knowledge about the terrain and WSN application.
From [9,10,12,24], we generalize the sensing requirements for the general deployment model.It is required that an event taking place at a certain reference point (, ) should be detected by at least (, ) numbers of sensor nodes with the probability of   (, ).Hence, the sensing requirements are defined at a specific point (, ) and parametrized as follows: (i)   (, ): detection probability of a sensor desired at (, ), (ii) (, ): number of sensors required to detect an event at (, ).
We then combine these parameters to the sensor density desired at (, ), (, ).First we compute the area of the sensing region where a sensor node can detect an event with higher probability than   (, ).We assume probabilistic sensing model, in which the detection probability decays exponentially as the power of distance.When we suppose  is the distance of a sensor from an event,  − would be     the detection probability of the sensor, where  is a positive parameter that represents the physical characteristics of the sensor node and it is determined by the sensor type [9,12].Hence a sensor can detect an event taking place within −(ln   (, )/) with higher probability than   (, ) and the area of the sensing region is {−(ln   (, )/)} 2 when we assume sensors are omnidirectional.In other words, an event at (, ) can be detected by sensors located in the sensing region of {−(ln   (, )/)} 2 with the probability of   (, ).(, ) also requires at least (, ) number of sensors to be located in the sensing region.Thus, However, (, ) is a goal of density to achieve when deploying sensor nodes.When placing sensor nodes as a group, it is likely that there exists a gap between the goal (, ) and the actual density of sensor nodes at (, ).We represent the gap, (, ), as follows: where   is the total number of sensor groups and (  (, , −(ln   (, )/)))/({−(ln   (, )/)} 2 ) is the density of sensor nodes belonging to th sensor group, () at (, ).Let us defer the explanation of   (⋅) to Section 6.2.4.
Figure 3(a) shows an initial state of (, ) when the target sensing field is covered by 25 reference points.With  = 1, (, ) is derived from the sensing requirements given to the reference point (, ), that is,   (, ) and (, ).Since no sensor groups are deployed yet, (, ) is the same as (, ) for now.

4.2.
Step 2: Setup Deployment Points.The goal of this step is to set deployment points of sensor groups on the positions that would minimize the sum of all (, ), that is, min ∑ ∀(,) (, ).We first perform initial placement and then adjust the position of the deployment points.Initial Placement.We conduct the initial deployment as shown in Algorithm 1. Algorithm 1 finds a reference point of highest (, ) and assigns an unassigned sensor group at the point iteratively.Since (, ) represents the gap between (, ) and the sensor density of assigned sensor groups, the value of (, ) keeps being updated during the process.As a result, we obtain the set  of assigned deployment points of sensor groups.
We will improve the result of initial placement in the following steps.We first adjust positions in  to minimize the sum of (, ).And then we determine an optimal position (in Step 3) with regard to the intergroup connectivity.
Position Adjustment.We present a new algorithm, pVFA, which adjusts the assigned deployment position of sensor groups to find more suitable position for achieving the goal.pVFA is an iterative, subgradient method.In an iteration of pVFA, every sensor group calculates a gradient that would decrease the sum of all (, ).The gradient is represented as an Euclidean vector (direction and magnitude) in the target sensing field.Sensor groups move along their gradients by a unit step at the end of an iteration.
Figure 3(b) shows the results of this step.The circles indicate the effective region of sensor groups (which we will describe in the next step).The initial deployment determines the gray circles while the black circles indicate the position of sensor groups after the position adjustment.We show the gradient ∇ () as a vector in arrow.As a result, we could obtain the intermediate deployment points of sensor groups and we will finalize the optimal deployment points in the next step.

4.3.
Step 3: Adjust Distributions.The result of the previous step could have satisfied the sensing requirements (initially given by the general deployment model) but may have isolated groups having no well-connected adjacent groups because of missing the intergroup connectivity.To avoid such a case, we adjust the assigned deployment point and distribution of sensor groups before accomplishing the group placement plan.
The requirement for achieving "well-connectedness" in the intergroup connectivity is to have an effective, reasonable number of interconnections for two adjacent sensor groups.Thus, we count interconnections between sensor nodes, both of which are effective members in their own sensor groups only.To do so, we first define an effective region of a sensor group as the area covered by an effective number (we set the effective number as 80 percent of the number of sensor nodes in a group) of sensor nodes in that group.And we then set the minimum number of interconnections for two sensor groups to become a connected component.
Effective Region and Interconnections.We model sensor nodes deployed in a sensor group by omnidirectional probabilistic distributions, for example, Gaussian distribution.Hence the effective region is a circular region whose radius we calculate from the inverse cumulative distribution (CDF) [25] of the probabilistic distribution.CDF of the distribution of a sensor group returns the portion of member nodes for a given region of the sensor group; thus the inverse CDF provides an area (or a radius) that holds the given portion of sensor nodes.For example, we calculate the radius of the effective region as  −1 (0.8), where  −1 () is the inverse CDF.We then regard interconnections of sensor nodes located in intersection of the effective regions of two adjacent sensor groups as effective interconnections.Let   and   , respectively, denote the number of sensor nodes from () and () in the intersection region between () and ().

Minimum Number of Interconnections.
To become a connected component, a sensor group must have such a minimum degree of graph as ⌈ log   ⌉, where  is a tunable radio transmission range parameter ( ≥ 1.5 will increase the global connectedness to be close to 1) [26] and   is the number of sensor nodes in a sensor group.Similarly, two sensor groups must have a minimum degree of graph, ⌈ log 2  ⌉.Therefore, we define a set of well-connected neighbor groups, N , for group (): where  * 1 is the probability that two nodes of different groups can be connected.It indicates that two nodes are within each other's communication range and also share keys because only sensor nodes sharing the same key can communicate with each other [5].Finally, to avoid the case that isolated groups exist, the following condition should be satisfied: pVFA with an Extending Option.We improve the intergroup connectivity of the isolated sensor groups by extending their effective regions.For this purpose, we employ pVFA with an extending option.Algorithm 3 shows the process of this step.First we compute the effective region, denoted by   , of a group () and calculate intergroup connections between every pair of neighboring sensor groups, which have overlapped effective region in common.We then identify the isolated groups by using the condition of (4).When extending the effective region, we control the parameter of probability distribution of the sensor group.Here we suppose that we model the probability distribution as the two-dimensional Gaussian distribution.Algorithm 2. This process is repeated until there is no isolated group and the average magnitude of the gradient is below   .The result is a deployment plan for a given sensing field.The deployment plan indicates the position of sensor groups (i.e., deployment points) and its distribution parameter (i.e., std).
In Figure 3(c), the gray circle and the black circle indicate the effective region, respectively, before and after the adjustment.We could observe that isolated groups have extended their effective regions while several groups have moved to minimize (, ) in Figure 3(c).Compared with the result of Step 2, the fraction of connected groups has been significantly improved from 0.455 to 1.0 at the cost of (, ), of which the average increased from 0.0043 to 0.0132.

Key Management (Phase 2)
In this section, we describe the key management phase of GenDep.On the basis of the result of the group placement phase, we preinstall key sets to sensors for establishing pairwise keys in the key management phase.To do so, we describe building group structures in Step 1, preinstalling key sets to sensors in Step 2, and establishing pairwise keys in Step 3 (after deployment).

5.1.
Step 1: Build Group Structures.In order to provide the location awareness to the key management schemes, we need to define a zone for a group.The key management schemes assume zones are nonoverlapped; thus we divide the sensing field into zones by using the Voronoi decomposition method [27], where a Voronoi cell for a seed point is a region consisting of points that are closer to the seed point than other seed points.
By employing the deployment points of groups as the seed points, we define a zone for the group () is the Voronoi cell based on its deployment point, [, ]  .Let   denote a set of groups sharing Voronoi edges with the group ().Then we could define a set of neighbor groups, (), as follows: Figure 4(a) is an example of the zones based on the deployment points of Figure 3.The sensing field was partitioned into 11 zones.Every zone has different shapes and different neighbors.In order to explain the subsequent process more clearly, we use the field of Figure 4(b) that consists of various polygons, that is, irregular zones.
After partitioning zones, every pair of two neighboring zone groups is merged to be an extended group, EG.A group belongs to as many EGs as the number of its neighbor groups.
Algorithm 4 explains the process for setting the neighbor sensor group and assigning extended groups.All the assigned EGs are in .In addition, Figure 5 illustrates an example of multiple EGs (i.e., 5 EGs) overlapped on the group  (7).Note that EGs could intrinsically support location awareness because of binding a pair of adjacent zones.

5.2.
Step 2: Preinstall Key Sets.In this step, we assign key predistribution schemes to EGs and preinstall key sets to be used for key establishment.Before preinstall keys to sensor nodes, we select a key predistribution scheme suitable for each EG.Because each EG is an independent space, we could assign not only homogeneous but also heterogeneous key predistribution schemes to EGs.It is clear that heterogeneous schemes could only affect their own EGs.For example, a compromised sensor node may only contaminate sensors in its local EG.When selecting key predistribution schemes, we could flexibly approach them by considering their distinct features in terms of node-capture resilience, storage overhead, and computational complexity.We could prioritize one of those features in each EG.For instance, we could select RP for prioritizing the perfect resilience against International Journal of Distributed Sensor Networks (a) Voronoi decomposition for Figure 3 Deployment point node capture attacks or RKP for higher connectivity.No key predistribution scheme is a panacea.According to the selected key predistribution schemes, we preinstall key sets to sensor nodes.Algorithm 5 shows the procedure.First we assign unique identifiers, ID  and ID EG , to each sensor node and each EG, respectively.For each EG, we generate a key pool, K EG(,) , according to the selected key predistribution scheme for the EG.From the key pool, we select a key set and install it on a sensor node of the EG.
The method for generating a key pool GenerateKeyPool and selecting a key set from the key pool SelectKeysFrom is dependent on the selected key predistribution scheme.

5.3.
Step 3: Establish Pairwise Keys.Finally, we could deploy sensor nodes into the sensing field.After deployment, the sensor nodes will then establish pairwise keys by themselves.The procedure to establish pairwise keys is as follows.
(1) Key Discovery.Each sensor node broadcasts its ID, ID  , and key list whereas the key list is composed of the identifiers of its keys, ⟨ID  , ID EG ⟩.Sensor nodes could exchange them with their neighbors and compare the lists for key establishment.
(2) Pairwise Key Establishment.If a sensor node finds a neighbor node sharing the same key, then it sends a connection request to the neighbor.By using the key agreement method of [3], the two adjacent nodes can generate a pairwise key in a secure way.
( neighbors, so that the connected neighbors could help them to establish pairwise keys.This step is repeated until the sensor node connects to all the neighbors and cannot find newly connectable nodes.

Performance Evaluation
In this section, we analyze the performance of GenDep.We compare our method to the previous location-aware key management schemes based on the fixed deployment model, such as GGD [5] and skRKP [2].

System Model for Evaluation.
We assume the following.
(i) The number of sensor nodes (  ) is 100 in a single group.
(ii) To compare the result with the previous schemes fair, we set each zone to be formed as a square: ∀(),  () = 4.
(iii) GenDep uses three configurations for key predistribution schemes: G-skRKP, G-COMB, and G-RP.For G-skRKP and G-RP, we select skRKP and RP as key predistribution schemes, respectively.In G-COMB, a combination of RKP and RP is applied; among 4 EGs of a group, 2 EGs use RKP and the other 2 EGs employ RP.The key pool size of the RKP scheme is 4880 to keep the faction of communication compromised under 0.4 until 50% nodes are compromised [1].
(iv) In order to keep the same level of key storage and to preserve the -secure property (for resilience against compromised sensor nodes, the key distribution schemes using the secret key matrix of the Blom scheme, such as GGD and skRKP [2,5], have an upper bound on the ratio of the number of sensor nodes and the size of secret matrix; this is called -secure property; please refer to [3] for the -secure property) [3],  = 7 for all the schemes but   = 3,   = 2, and   = 1 for GGD, skRKP-D, and G-skRKP, respectively.The analysis of key storage is described in Section 6.5.
Additionally, we set the parameters for GGD as  GGD = 8 and  GGD = 1 based on [5].

Key Graph
Likewise, let  1 () be the probability that two sensor nodes in the same () share at least one common key.The sensor nodes in the same group have all their EGs in common.They can be connected unless they do not share any key in their EGs, which are EG(, ), () ∈ ().For each EG(, ) that they share, the key graph connecting probability is  1 (, ).Thus, If a single key predistribution scheme is applied to all EGs of (),  1 () is calculated as since the number of shared EGs of the two sensor nodes in the same group is  () .Appendix A shows the probabilities,  1 and  1 , on the instantiations of key predistribution schemes in GenDep.

International Journal of Distributed Sensor Networks
A sensor node can be connected to neighbors directly (1 hop) or through relaying of other neighbor nodes (more than 1 hop).For simplicity and clarity, we consider 2 hops at maximum.Let   (, , ) be the number of sensors of () within the communication range  from a position (, ).We assume a sensor node  in () at (, ).For the sensor node , we take    =   (, , ) − 1 as the number of reachable neighbor nodes in () (the number of sensor nodes within the communication range except itself) and    =   (, , ) as the number of reachable neighbor nodes in (), where  ̸ =  and () ∈ ().

Key Graph Connectivity within the Same
Group.Suppose that a sensor node  connects to another sensor node V in the same group (), , V ∈ ().We represent the probability that two nodes are connected,  ,V , as where the probability of the 1-hop connection,  ,V [1 hop], is equal to  1 ().When we calculate the probability of the 2hop connection,  ,V [2 hops], we take account of two cases of relaying: by a node in the same group or another node in a neighbor group.Let us denote by   and   the probabilities that the sensor nodes,  and V, are connected via a node in () and () ∈ (), respectively.The two nodes can be connected in any of these cases.Hence, We calculate   and   by developing the binomial probability distribution (the development of the binomial probability distribution for the key graph connecting probability is inspired by [28]).We compute   as follows: where the part ∑ − 1 neighbors (the number of reachable neighbor nodes except V) and  is connected to one of  1 sensor nodes by  1 ().The term, 1 − (1 −    1 ())  1 , represents the probability that at least one of the  1 sensor nodes is connected to V. Note that   is the probability that any two sensor nodes are within the communication range of each other.If the communication range is circle-shaped and of equal radius, then   is 0.5865 regardless of  according to [28].Likewise, we calculate   as Equation ( 12) represents that  is connected to V via one of  2 sensor nodes in () ∈ ().Since the  2 sensor nodes belong to (), the connecting probability between them and  or V is  1 (, ).Finally, we get (13) by joining ( 9), ( 10), (11), and (12).
In ( 14), note that  1 () and  1 (, ), respectively, represent the probability that node  connects to  1 neighbor nodes and the probability that  1 neighbor nodes connect to node V. Second,  *  is the probability of 2-hop connection by relaying of a sensor node in () and is given as Third,  *  is the probability of 2-hop connection by the relay of a sensor node in neighbor groups except (), which are () \ {()}.Hence,  *  is From ( 14), (15), and ( 16), we derive that Finally, Joining ( 14), ( 15), (16), and ( 17), we represent  ,V * as (19).6, the connectivity of GGD is best at the same group but worst between the neighbor groups at the same time.The reason is that GGD employs different methods for the same and the neighbor groups.The connectivities at the same group are similar in G-skRKP,G-RP, and skRKP-D.But the connectivities between the neighbor groups are better than skRKP-D in G-skRKP and G-RP as illustrated in Figure 6(b).When we assume the number of neighbor nodes is 21, in Figure 6(a), the  ,V of G-RP is 22% and 3% lower than GGD and skRKP-D, respectively, but, in Figure 6(b),  ,V * of G-RP is 640.7% and 55.7% higher than the two schemes.In other words, GenDep has slightly lower connectivity within the same group but far higher connectivity between the neighbor groups.In both cases of Figure 6, G-COMB achieves high connectivity.Furthermore, it is noteworthy that RP is a good choice as a key predistribution scheme because G-RP shows better performance than skRKP-D and G-skRKP.In addition, RP does not require complex computation in the key establishment and has better network resilience [22].

Discussion on Key Graph Connectivity according to
Deployment Distribution.We model the deployment method for a sensor group as probabilistic distribution of sensor nodes.In this section, we take into consideration two kinds of probabilistic distributions: Gaussian and uniform distributions.
Gaussian Distribution.First, in the Gaussian distribution, sensor nodes are deployed in the 2-dimension (2D) Gaussian distribution from their deployment point.We denote by (, ) the cumulative density function (CDF) of the 2D Gaussian distribution within a circle whose center is located at the distance of  from the deployment point and its radius is .More formally, where  is the standard deviation of the Gaussian distribution.Please refer to [29]   denote the position of the deployment point, [, ]  , by using   and   .The number of nodes in () at the point of (, ) within  is Figure 7 depicts the probability of the key graph connectivity to nodes in any neighbor group,  * = 1−∏   (1− ,V * ), from (0, 0) to (100, 100) where the deployment point is located at (50, 50).Since the distribution of neighbor nodes determines the probability of the key graph connectivity, Figure 7 shows high connectivity along each direction to the deployment points of neighbor groups.Additionally, note that the shape of the zone in Figure 7(a) is a regular polygon, that is, a square, but that of Figure 7(b) is the irregular pentagon, which is the same shape to the zone  in Figure 4(b).
Uniform Distribution.Second, in the uniform distribution, the coverage area and density determine the number of neighbor nodes regardless of the deployment point.Let   be the sensor node density of (), which can be calculated by   =   /|zone  |, where zone  is the zone of ().Hence, the number of sensor nodes within  in () is where |zone  ∩ {(, ) | √ ( −   ) 2 + ( −   ) 2 < }| is the area of the intersected region between zone  and the communication range of the node located at (  ,   ).The intersected area can be calculated geometrically using the sensor coverage analysis such as [5].

Simulation.
We perform simulation to validate our analysis result in more realistic situations.Our simulation follows the system setup of Sections 6.1 and 6.2.4 (  = 100,  = 25,  = 10 m).In the simulation, we place nine sensor groups as shown in Figure 8.Each group is located from a given group distance.We ran simulation with varying distances between groups to check the number of connections to confirm the trends of key graph connectivity of our analysis in Section 6.2.3.In the simulation, we implemented GGD and G-skRKP, since the relative performance of G-skRKP to GGD is a good indicator for the trend of the analysis result.
Figure 9 shows the result of the simulation.We change the distance between groups from 20 m to 50 m and count the total number of connections established within the two-hop key graph after deployment.Since sensor nodes are deployed randomly in Gaussian distribution, we ran simulation 30 times to get the average of the results.As expected, we can observe that the connectivity within the same group does not change by varying the distance in Figure 9(a).GGD has 18.8% more connections among sensor node within the same group than G-skRKP.As shown in Figure 9(b), however, G-skRKP always outperforms GGD by 338% in the number of connections among neighbor groups.Therefore, both results show the same trend as the result of the numerical analysis in Section 6.2.3 and G-skRKP can provide higher connectivity between groups.

Security Analysis. The group structures in GenDep
prevent the general deployment model from incurring additional security concerns.The security conditions for the key predistribution schemes, such as the -secure property, can also be applied easily.
Figure 10 depicts the network resilience against node capture attacks for the same size of key sets,   = 30, and the local connectivity,  1 = 0.14.We refer to [3,19] and Appendix B for the equations of the network resilience.In Figure 10, skRKP shows the strong resistance to the node capture attacks when   is only restricted under 100, that is, satisfying the -secure property.However, RP can achieve the perfect resilience against the node capture attacks.Note that the network resilience of qRKP is worse than RKP due to the small size of   and key pool.Therefore, we exclude the qRKP scheme in the performance comparison.In case that nodes store a relatively smaller number of keys for an EG, the RKP scheme is better to be selected for security and connectivity than the qRKP scheme.

Storage Overhead.
The size of the key storage required to preinstall key sets in a sensor node is dependent on the key predistribution schemes.Let  , be the size of the key storage for the th EG of a sensor node.The total storage for a node can be computed as  = ∑  () =1  , .The security conditions of the key predistribution scheme may restrict the lower bound of   .In that sense, for the Blom-based schemes in GenDep, the security parameter  is calculated as 2    /.That is, the selected key space in GenDep,   , should be half of  that other Blom-based schemes use in order to keep the same value of   .Thus,   for an EG with skRKP is In case that skRKP is assigned to all EGs, for example,G-skRKP,  =  () ⋅   .Table 2 shows the key storage overhead on various configurations for this case.Based on the configurations of [3,5] ( = 7,  = 2,   = 1, 64-bit key), the required key storage for GenDep is under a few kilobytes for both cases of  () = 4 (rectangular zone) and  () = 6 (hexagonal zone).Even in the cases of hexagonal zone, 128bit key, and   = 2, the key storage is under 12 kbytes.Since MICAz sensor nodes have a 128 kbyte program memory and a 512 kbyte secondary memory [30], the required key storage is small enough to be installed to the memory of sensor nodes.
International Journal of Distributed Sensor Networks  Let   ,   ,  G-skRKP ,  G-COMP , and  G-RP be the required storages to store keys for GGD, skRKP-D, G-skRKP, G-COMB, and G-RP, respectively.In skRKP-D, each key pool is shared among neighbor zones in proportion to  or .In other words, due to the -secure property, we cannot deploy more than  + (4 + 4) nodes.Hence,  = ⌈  /⌉ for GGD and  = ⌈2  /⌉ for skRKP-D using the condition 4 + 4 = 1 in [2].From these conditions, the required key storage for the schemes is From (24), the parameters of the system model in Section 6.1 are determined to achieve the same level of key storage,   =  G-skRKP = 120 and   = 128.Since G-RP and G-COMB do not require the security conditions on , we set the  G-COMP =  G-RP = 120.

Conclusion
In this paper, we proposed GenDep, the novel framework for location-aware key management in WSNs regarding the general deployment model.Due to the notion of generalized location awareness, GenDep can apparently provide a practical advantage.The WSN can be deployed without losing its security in the real world where nonuniform geographical features exist.In GenDep, the group placement phase is operated to find optimal deployment positions of sensor groups.In the following key management phase, a whole deployment area is partitioned into a number of different smaller zones based on the deployment points of sensor groups.Subsequently, we build a new group structure to cover all sensor nodes deployed in neighboring zones.Using the group structures, we can render the benefit of location

Figure 1 :
Figure 1: An example of the sensing field in the real world.

Figure 3 :
Figure 3: Three steps of the group placement scheme.(All sensor groups are modeled as the Gaussian distribution with  = 10.0.)

Figure 8 :
Figure 8: Simulation setting.We place nine sensor groups and deploy sensor nodes in Gaussian distribution.(Please note that we use  = 10 in this figure to show sensor groups more distinguishably but  = 25 in the simulation to follow the settings of Sections 6.1 and 6.2.4.)

Figure 9 :
Figure 9: Key graph connectivity in the simulation.
[17]oubi et al. employVoronoi polygons in[17]to find the coverage holes.Each sensor node has its Voronoi polygon that is derived by relative position to adjacent nodes.Thus the difference between the sensing area and the Voronoi polygon can show the effectiveness of coverage.The authors proposed node-based and vertex-based strategies to relocate sensor nodes.He et al. presented curve-based deployment for barrier coverage in Setup (, ) at each reference point V(x, y) (b) Setup deployment points over the reference points (  = 0.1 m and   = 0.001) V(x, y) deployment points assigned to sensor groups Output: A set   = {[, ]  | 1 ≥  ≥   } of deployment points after position adjustment Update its position as [ +   ⋅ ∇ () |  ,  +   ⋅ ∇ () |  ]  of  Update (, )s in .end Copy  to   .
Thus we increase the standard deviation (std),   , of () by multiplying   , which is a unit step for std.During extending the effective region, we can improve the connectivity but we could also experience the lower density of sensor nodes in the sensor group at the same time.It may bring back (, ).Thus pVFA also adjusts the position by applying the algorithm PositionAdjustment of Input: Build structure: define the neighbor groups and build a set of extended groups of every pair of neighboring sensor groups.

Table 1 :
Local connectivity ( 1 and  1 ).Numerical Results in Key Graph Connectivity.Figure 6 depicts  ,V and  ,V * when    and    are the same.Table 1 shows the parameters,  1 and  1 , computed by the equations as referred to Appendix A. As illustrated in Figure