We show that massive attacks against sensor networks that use random key pre-distribution schemes cannot be cheap, provided that the parameters are set in the right way. By choosing them appropriately, any adversary whose aim is to compromise a large fraction of the communication links is forced, with overwhelming probability, to capture a large fraction of the nodes. This holds regardless of the information available to the adversary to select the nodes. We consider two important security properties: We say that the network is unassailable if the adversary cannot compromise a linear fraction of the communication links by compromising a sub-linear fraction of the nodes, and that the network is unsplittable if the adversary cannot partition the network into two (or more) linear size fragments. We show how to set the relevant parameters of random key pre-distribution - pool and key ring size - in such a way that the network is not only connected, but also provably unassailable and un-splittable with high probability. Moreover, we also show how to set the parameters in such a way to form a giant component in the network, a connected subgraph including, say, 99% of the sensors. Giant components emerge by using much smaller key rings, are sparse, and, quite remarkably, are provably unassailable and unsplittable as well. All these results are supported by experiments. Copyright 2008 ACM.

Unassailable sensor networks / DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro; Panconesi, Alessandro; Jaikumar, Radhakrishnan. - (2008), p. 1. (Intervento presentato al convegno 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08 tenutosi a Istanbul; Turkey nel 22 September 2008 through 25 September 2008) [10.1145/1460877.1460911].

Unassailable sensor networks

DI PIETRO, ROBERTO;MANCINI, Luigi Vincenzo;MEI, Alessandro;PANCONESI, Alessandro;
2008

Abstract

We show that massive attacks against sensor networks that use random key pre-distribution schemes cannot be cheap, provided that the parameters are set in the right way. By choosing them appropriately, any adversary whose aim is to compromise a large fraction of the communication links is forced, with overwhelming probability, to capture a large fraction of the nodes. This holds regardless of the information available to the adversary to select the nodes. We consider two important security properties: We say that the network is unassailable if the adversary cannot compromise a linear fraction of the communication links by compromising a sub-linear fraction of the nodes, and that the network is unsplittable if the adversary cannot partition the network into two (or more) linear size fragments. We show how to set the relevant parameters of random key pre-distribution - pool and key ring size - in such a way that the network is not only connected, but also provably unassailable and un-splittable with high probability. Moreover, we also show how to set the parameters in such a way to form a giant component in the network, a connected subgraph including, say, 99% of the sensors. Giant components emerge by using much smaller key rings, are sparse, and, quite remarkably, are provably unassailable and unsplittable as well. All these results are supported by experiments. Copyright 2008 ACM.
2008
4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
random pre-distribution of keys; security; wireless sensor network
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Unassailable sensor networks / DI PIETRO, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro; Panconesi, Alessandro; Jaikumar, Radhakrishnan. - (2008), p. 1. (Intervento presentato al convegno 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08 tenutosi a Istanbul; Turkey nel 22 September 2008 through 25 September 2008) [10.1145/1460877.1460911].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/207534
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? ND
social impact