Security-Performance TradeoffsofInheritance
Title: Security-Performance TradeoffsofInheritance
Main Research Question: How does a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from a given key pool impact the security and performance of sensor networks?
Methodology: The researchers proposed a 2-Phase technique for key predistribution in sensor networks. In the first phase, a certain number of keys are randomly selected from a large key pool and distributed to sensor nodes. In the second phase, secure paths are established between any two nodes using secure links in a logical graph. An analytical framework was developed to measure sensor network connectivity and resilience to enemy attacks. Metrics such as average connectivity and q-composite connectivity were used to compare the performance of the 2-Phase scheme to the random scheme.
Results: The study showed that the 2-Phase scheme provides better average connectivity and superior q-composite connectivity than the random scheme. It was also proven analytically that the vulnerability of a communication link under arbitrary node captures by an adversary is higher under the random scheme. Additionally, the study demonstrated that the vulnerability of an arbitrary communication link to single node capture is lower under the 2-Phase scheme, assuming both an omniscient adversary and an average-case adversary.
Implications: The 2-Phase technique for key predistribution proposed in this study offers a novel approach to improving security and performance in sensor networks. By combining inherited and random key assignments, the technique provides better network connectivity and resilience to enemy attacks compared to existing methods. This could have significant implications for the design and deployment of sensor networks in various applications, such as environmental monitoring, healthcare, and security systems.
Link to Article: https://arxiv.org/abs/0405035v2 Authors: arXiv ID: 0405035v2