15.07.2013 Views

Thesis

Thesis

Thesis

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

List of Figures<br />

2.1 Illustration of a key-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

2.2 Illustration of single member compromise . . . . . . . . . . . . . . . . . . . . . . . 12<br />

2.3 Illustration of several members compromise . . . . . . . . . . . . . . . . . . . . . . 20<br />

2.4 Simulation results for branching factor vectors . . . . . . . . . . . . . . . . . . . . . 22<br />

2.5 system comparison based on approximation . . . . . . . . . . . . . . . . . . . . . . 23<br />

2.6 Operation of the group-based private authentication scheme . . . . . . . . . . . . . 24<br />

2.7 Tree and group based authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

2.8 Simulation results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27<br />

3.1 Mix and observed zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31<br />

3.2 Simplified map of Budapest generated for the simulation. . . . . . . . . . . . . . . 35<br />

3.3 Success probabilities of the adversary . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br />

3.4 Results of the simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br />

3.5 Success rate of a tracking attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 40<br />

3.6 Example intersection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br />

3.7 Success rate of the simple attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br />

3.8 Success rate of the simple attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . 43<br />

3.9 Number of signatures to be verified . . . . . . . . . . . . . . . . . . . . . . . . . . . 45<br />

4.1 Result of aggregator election protocol . . . . . . . . . . . . . . . . . . . . . . . . . 51<br />

4.2 Probability of being cluster aggregator . . . . . . . . . . . . . . . . . . . . . . . . . 57<br />

4.3 Probability of being cluster aggregator . . . . . . . . . . . . . . . . . . . . . . . . . 58<br />

4.4 Result of balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br />

4.5 Entropy of the attacker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59<br />

4.6 Connected dominating set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63<br />

4.7 Aggregation example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

4.8 Query example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

4.9 Graphical representation of the suitable intervals . . . . . . . . . . . . . . . . . . . 69<br />

4.10 Misbehavior detection algorithm for the query protocol. . . . . . . . . . . . . . . . 71<br />

xiii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!