Downloads & Free Reading Options - Results
Security Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks by Rajgopal Kannan
Read "Security Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks" by Rajgopal Kannan through these free online access and download options.
Books Results
Source: The Internet Archive
The internet Archive Search Results
Available books for downloads and borrow from The internet Archive
1Security-Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks
By Rajgopal Kannan, Lydia Ray, Arjan Durresi and S. Iyengar
Key predistribution is a well-known technique for ensuring secure communication via encryption among sensors deployed in an ad-hoc manner to form a sensor network. In this paper, we propose a novel 2-Phase technique for key predistribution based on a combination of inherited and random key assignments from the given key pool to individual sensor nodes. We also develop an analytical framework for measuring security-performance tradeoffs of different key distribution schemes by providing metrics for measuring sensornet connectivity and resiliency to enemy attacks. In particular, we show analytically that the 2-Phase scheme provides better average connectivity and superior $q$-composite connectivity than the random scheme. We then prove that the invulnerability of a communication link under arbitrary number of node captures by an adversary is higher under the 2-Phase scheme. The probability of a communicating node pair having an exclusive key also scales better with network size under the 2-Phase scheme. We also show analytically that the vulnerability of an arbitrary communication link in the sensornet to single node capture is lower under 2-Phase assuming both network-wide as well as localized capture. Simulation results also show that the number of exclusive keys shared between any two nodes is higher while the number of $q$-composite links compromised when a given number of nodes are captured by the enemy is smaller under the 2-Phase scheme as compared to the random one.
“Security-Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks” Metadata:
- Title: ➤ Security-Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks
- Authors: Rajgopal KannanLydia RayArjan DurresiS. Iyengar
- Language: English
Edition Identifiers:
- Internet Archive ID: arxiv-cs0405035
Downloads Information:
The book is available for download in "texts" format, the size of the file-s is: 9.33 Mbs, the file-s for this book were downloaded 88 times, the file-s went public at Fri Sep 20 2013.
Available formats:
Abbyy GZ - Animated GIF - Archive BitTorrent - DjVu - DjVuTXT - Djvu XML - Item Tile - Metadata - Scandata - Single Page Processed JP2 ZIP - Text PDF -
Related Links:
- Whefi.com: Download
- Whefi.com: Review - Coverage
- Internet Archive: Details
- Internet Archive Link: Downloads
Online Marketplaces
Find Security-Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Buy “Security Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks” online:
Shop for “Security Performance Tradeoffs Of Inheritance Based Key Predistribution For Wireless Sensor Networks” on popular online marketplaces.
- Ebay: New and used books.