Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
List of Figures<br />
2.1 Illustration of a key-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />
2.2 Illustration of single member compromise . . . . . . . . . . . . . . . . . . . . . . . 12<br />
2.3 Illustration of several members compromise . . . . . . . . . . . . . . . . . . . . . . 20<br />
2.4 Simulation results for branching factor vectors . . . . . . . . . . . . . . . . . . . . . 22<br />
2.5 system comparison based on approximation . . . . . . . . . . . . . . . . . . . . . . 23<br />
2.6 Operation of the group-based private authentication scheme . . . . . . . . . . . . . 24<br />
2.7 Tree and group based authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />
2.8 Simulation results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />
3.1 Mix and observed zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31<br />
3.2 Simplified map of Budapest generated for the simulation. . . . . . . . . . . . . . . 35<br />
3.3 Success probabilities of the adversary . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br />
3.4 Results of the simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br />
3.5 Success rate of a tracking attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br />
3.6 Example intersection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br />
3.7 Success rate of the simple attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br />
3.8 Success rate of the simple attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br />
3.9 Number of signatures to be verified . . . . . . . . . . . . . . . . . . . . . . . . . . . 45<br />
4.1 Result of aggregator election protocol . . . . . . . . . . . . . . . . . . . . . . . . . 51<br />
4.2 Probability of being cluster aggregator . . . . . . . . . . . . . . . . . . . . . . . . . 57<br />
4.3 Probability of being cluster aggregator . . . . . . . . . . . . . . . . . . . . . . . . . 58<br />
4.4 Result of balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br />
4.5 Entropy of the attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59<br />
4.6 Connected dominating set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63<br />
4.7 Aggregation example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
4.8 Query example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />
4.9 Graphical representation of the suitable intervals . . . . . . . . . . . . . . . . . . . 69<br />
4.10 Misbehavior detection algorithm for the query protocol. . . . . . . . . . . . . . . . 71<br />
xiii