TY - GEN
T1 - Sensor networks that are provably resilient
AU - Di Pietro, Roberto
AU - Mancini, Luigi V.
AU - Mei, Alessandro
AU - Panconesi, Alessandro
AU - Radhakrishnan, Jaikumar
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2006/12/1
Y1 - 2006/12/1
N2 - We give, for the first time, a precise mathematical analysis of the connectivity and security properties of sensor networks that make use of the random pre-distribution of keys. We also show how to set the parameters- pool and keyring size- in such a way that the network is not only connected with high probability via secure links, but also provably resilient, in the following sense: we formally show that any attacker that captures sensors at random with the aim of compromising a constant fraction of the secure links, must capture at least a constant fraction of the nodes of the network. In the context of wireless sensor networks where random pre-distribution of keys is employed, we are the first to provide a mathematically precise proof, with a clear indication of parameter choice, that two crucial properties - connectivity via secure links and resilience against malicious attacks- can be obtained simultaneously. Our theoretical results are complemented by extensive simulations that reinforce our main conclusions. ©2006 IEEE.
AB - We give, for the first time, a precise mathematical analysis of the connectivity and security properties of sensor networks that make use of the random pre-distribution of keys. We also show how to set the parameters- pool and keyring size- in such a way that the network is not only connected with high probability via secure links, but also provably resilient, in the following sense: we formally show that any attacker that captures sensors at random with the aim of compromising a constant fraction of the secure links, must capture at least a constant fraction of the nodes of the network. In the context of wireless sensor networks where random pre-distribution of keys is employed, we are the first to provide a mathematically precise proof, with a clear indication of parameter choice, that two crucial properties - connectivity via secure links and resilience against malicious attacks- can be obtained simultaneously. Our theoretical results are complemented by extensive simulations that reinforce our main conclusions. ©2006 IEEE.
UR - https://ieeexplore.ieee.org/document/4198829/
UR - http://www.scopus.com/inward/record.url?scp=50049090165&partnerID=8YFLogxK
U2 - 10.1109/SECCOMW.2006.359569
DO - 10.1109/SECCOMW.2006.359569
M3 - Conference contribution
SN - 1424404231
BT - 2006 Securecomm and Workshops
ER -