Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks

We present a comprehensive analysis on connectivity and resilience of secure sensor networks under the widely studied q-composite key predistribution scheme. For network connectivity, which ensures that any two sensors can find a path in between for secure communication, we derive the conditions to...

Full description

Bibliographic Details
Main Author: Zhao, Jun
Format: Journal Article
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/86913
http://hdl.handle.net/10220/44208
_version_ 1811681716523237376
author Zhao, Jun
author_facet Zhao, Jun
author_sort Zhao, Jun
collection NTU
description We present a comprehensive analysis on connectivity and resilience of secure sensor networks under the widely studied q-composite key predistribution scheme. For network connectivity, which ensures that any two sensors can find a path in between for secure communication, we derive the conditions to guarantee connectivity in consideration of: 1) node-capture attacks, where the adversary may capture a set of sensors and compromise keys in their memory; 2) sensor mobility, meaning that sensors can move around so that the network topology may change over time; 3) physical transmission constraints, under which two sensors have to be within each other's transmission range for communication; 4) the boundary effect of network fields; and 5) link unreliability, meaning that links are allowed to be unreliable. In contrast, many prior connectivity analyses of secure sensor networks often ignore the above issues. For resilience, although limited studies have presented formal analysis, it is often assumed that the adversary captures a random set of sensors, whereas this paper allows the adversary to capture an arbitrary set of sensors. We present conditions to ensure unassailability and unsplittability in secure sensor networks under the q-composite scheme. Unassailability ensures that an adversary capturing any set consisting of a negligible fraction of sensors can compromise only a negligible fraction of communication links although the adversary may compromise communications between non-captured nodes, which happen to use keys that are shared by captured nodes. Unsplittability means that when a negligible fraction of sensors are captured, almost all of the remaining nodes are still securely connected. Based on the results of connectivity, unassailability, and unsplittability, we provide useful guidelines for the design of secure sensor networks.
first_indexed 2024-10-01T03:45:22Z
format Journal Article
id ntu-10356/86913
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:45:22Z
publishDate 2017
record_format dspace
spelling ntu-10356/869132020-03-07T11:48:58Z Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks Zhao, Jun Security Key Predistribution We present a comprehensive analysis on connectivity and resilience of secure sensor networks under the widely studied q-composite key predistribution scheme. For network connectivity, which ensures that any two sensors can find a path in between for secure communication, we derive the conditions to guarantee connectivity in consideration of: 1) node-capture attacks, where the adversary may capture a set of sensors and compromise keys in their memory; 2) sensor mobility, meaning that sensors can move around so that the network topology may change over time; 3) physical transmission constraints, under which two sensors have to be within each other's transmission range for communication; 4) the boundary effect of network fields; and 5) link unreliability, meaning that links are allowed to be unreliable. In contrast, many prior connectivity analyses of secure sensor networks often ignore the above issues. For resilience, although limited studies have presented formal analysis, it is often assumed that the adversary captures a random set of sensors, whereas this paper allows the adversary to capture an arbitrary set of sensors. We present conditions to ensure unassailability and unsplittability in secure sensor networks under the q-composite scheme. Unassailability ensures that an adversary capturing any set consisting of a negligible fraction of sensors can compromise only a negligible fraction of communication links although the adversary may compromise communications between non-captured nodes, which happen to use keys that are shared by captured nodes. Unsplittability means that when a negligible fraction of sensors are captured, almost all of the remaining nodes are still securely connected. Based on the results of connectivity, unassailability, and unsplittability, we provide useful guidelines for the design of secure sensor networks. Accepted version 2017-12-28T04:32:36Z 2019-12-06T16:31:29Z 2017-12-28T04:32:36Z 2019-12-06T16:31:29Z 2017 Journal Article Zhao, J. (2017). Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks. IEEE Transactions on Information Theory, 63(10), 6714-6734. 0018-9448 https://hdl.handle.net/10356/86913 http://hdl.handle.net/10220/44208 10.1109/TIT.2017.2721424 en IEEE Transactions on Information Theory © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TIT.2017.2721424]. 21 p. application/pdf
spellingShingle Security
Key Predistribution
Zhao, Jun
Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title_full Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title_fullStr Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title_full_unstemmed Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title_short Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks
title_sort probabilistic key predistribution in mobile networks resilient to node capture attacks
topic Security
Key Predistribution
url https://hdl.handle.net/10356/86913
http://hdl.handle.net/10220/44208
work_keys_str_mv AT zhaojun probabilistickeypredistributioninmobilenetworksresilienttonodecaptureattacks