Security-Performance TradeoffsofInheritance: Difference between revisions
Created page with "Title: Security-Performance TradeoffsofInheritance Main Research Question: How does a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from a given key pool impact the security and performance of sensor networks? Methodology: The researchers proposed a 2-Phase technique for key predistribution in sensor networks. In the first phase, a certain number of keys are randomly selected from a large key pool and dis..." |
No edit summary |
||
Line 1: | Line 1: | ||
Title: Security-Performance TradeoffsofInheritance | Title: Security-Performance TradeoffsofInheritance | ||
Main Research Question: How does a novel 2-Phase | Main Research Question: How does a novel 2-Phase key predistribution scheme for wireless sensor networks balance the tradeoff between security and performance? | ||
Methodology: The researchers proposed a 2-Phase | Methodology: The researchers proposed a 2-Phase key predistribution scheme based on inherited and random key assignments from a given key pool. They developed an analytical framework to measure sensor network connectivity and resilience to enemy attacks. This framework provided metrics for measuring the se nsor network's average connectivity and q-composite connectivity, as well as the invulnerability of a communication link under arbitrary node captures. Simulation results were also used to compare the number of exclusive keys shared between any two nodes and the number of q-composite links compromised when a given number of nodes are captured by the enemy. | ||
Results: The | Results: The 2-Phase scheme provided better average connectivity and superior q-composite connectivity than the random scheme. The invulnerability of a communication link under arbitrary node captures was higher under the 2-Phase scheme. The probability of a communicating node pair having an exclusive key also scaled better with network size under the 2-Phase scheme. The number of exclusive keys shared between any two nodes was higher, while the number of q-composite links compromised was smaller under the 2-Phase scheme compared to the random one. | ||
Implications: The 2-Phase | Implications: The 2-Phase key predistribution scheme offers a balance between security and performance for wireless sensor networks. It provides better network connectivity and resilience to enemy attacks while maintaining a limited number of keys per node. This makes it an attractive solution for securing communication links in resource-limited and large-scale environments. | ||
Link to Article: https://arxiv.org/abs/ | Link to Article: https://arxiv.org/abs/0405035v3 | ||
Authors: | Authors: | ||
arXiv ID: | arXiv ID: 0405035v3 | ||
[[Category:Computer Science]] | [[Category:Computer Science]] | ||
[[Category:Scheme]] | |||
[[Category:2]] | |||
[[Category:Phase]] | [[Category:Phase]] | ||
[[Category:Key]] | [[Category:Key]] | ||
[[Category:Connectivity]] | [[Category:Connectivity]] |
Latest revision as of 16:01, 24 December 2023
Title: Security-Performance TradeoffsofInheritance
Main Research Question: How does a novel 2-Phase key predistribution scheme for wireless sensor networks balance the tradeoff between security and performance?
Methodology: The researchers proposed a 2-Phase key predistribution scheme based on inherited and random key assignments from a given key pool. They developed an analytical framework to measure sensor network connectivity and resilience to enemy attacks. This framework provided metrics for measuring the se nsor network's average connectivity and q-composite connectivity, as well as the invulnerability of a communication link under arbitrary node captures. Simulation results were also used to compare the number of exclusive keys shared between any two nodes and the number of q-composite links compromised when a given number of nodes are captured by the enemy.
Results: The 2-Phase scheme provided better average connectivity and superior q-composite connectivity than the random scheme. The invulnerability of a communication link under arbitrary node captures was higher under the 2-Phase scheme. The probability of a communicating node pair having an exclusive key also scaled better with network size under the 2-Phase scheme. The number of exclusive keys shared between any two nodes was higher, while the number of q-composite links compromised was smaller under the 2-Phase scheme compared to the random one.
Implications: The 2-Phase key predistribution scheme offers a balance between security and performance for wireless sensor networks. It provides better network connectivity and resilience to enemy attacks while maintaining a limited number of keys per node. This makes it an attractive solution for securing communication links in resource-limited and large-scale environments.
Link to Article: https://arxiv.org/abs/0405035v3 Authors: arXiv ID: 0405035v3