21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.4. Multiple Hash Cha<strong>in</strong>s <strong>for</strong> Key Agreement 119<br />

Probability of l<strong>in</strong>k key compromise<br />

1<br />

0.9<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

0<br />

1 10 100 1000<br />

Number of hash cha<strong>in</strong>s<br />

Figure 4.6: Probability of key compromise depend<strong>in</strong>g on the number of hash cha<strong>in</strong>s, <strong>for</strong> different<br />

sizes of adversaries. Note the logarithmic scale of the horizontal axis<br />

4.4.4 Comparison with Random Key Pre-Distribution<br />

Both the key agreement scheme based on multiple hash cha<strong>in</strong>s and the qcomposite<br />

random key predistribution scheme provide a probabilistic level of<br />

resilience. In both cases, it is measured by the fraction of a set of l<strong>in</strong>k keys that<br />

can be expected to be compromised.<br />

The hash cha<strong>in</strong> scheme provides full connectivity, i.e. every node is able to<br />

establish a l<strong>in</strong>k key with any other node. In contrast, the q-composite scheme<br />

provides only partial connectivity. However, the latter allows the connectivity<br />

to be set arbitrarily close to one if a reduced level of resilience is accepted.<br />

The resilience of the hash cha<strong>in</strong> scheme depends on the number t of cha<strong>in</strong>s<br />

be<strong>in</strong>g used, and the size j of the attacker. The resilience of the q-composite<br />

scheme depends on the size of the attacker n, the connectivity pc, and the parameter<br />

q.<br />

In terms of computational complexity, the hash cha<strong>in</strong> scheme requires a<br />

certa<strong>in</strong> overhead s<strong>in</strong>ce a number of hash computations have to be made by each<br />

node be<strong>for</strong>e the l<strong>in</strong>k key can be derived.<br />

We are go<strong>in</strong>g to compare the resilience of both schemes by an example. We<br />

assume the same key r<strong>in</strong>g size <strong>in</strong> both cases and ignore the storage overhead<br />

<strong>for</strong> <strong>in</strong>dices, which are roughly the same size <strong>in</strong> both cases and small compared<br />

to the key size.<br />

j=1<br />

j=2<br />

j=10<br />

j=20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!