21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.4. Security Evaluation 179<br />

Bandwidth overhead (byte)<br />

3500<br />

3000<br />

2500<br />

2000<br />

1500<br />

1000<br />

500<br />

0<br />

0 2 4 6 8 10 12 14 16 18 20<br />

Path length<br />

Figure 6.9: Bandwidth overhead<br />

Canvas, |mac|=7<br />

Canvas, |mac|=20<br />

EC<br />

MACs are truncated, the advantage of Canvas is reta<strong>in</strong>ed, however.<br />

6.4 Security Evaluation<br />

Be<strong>for</strong>e we actually present these results, we give a brief overview of the method<br />

that has been used to retrieve the numerical values <strong>for</strong> these comparisons.<br />

6.4.1 Analytical Assessment of Resilience<br />

We <strong>in</strong>troduce here the function B(x), which takes the number x of compromised<br />

nodes as <strong>in</strong>put and returns an approximation of the number of compromised<br />

paths. It is obvious that this approximation can be very rough only. The number<br />

of compromised nodes says noth<strong>in</strong>g about the topological position of the nodes<br />

with<strong>in</strong> the network. Each position differs <strong>in</strong> how many paths it will help to<br />

compromise.<br />

As a network model, we will use a random geometric graph. We loosely<br />

assume it has rectangular shape, and we ignore border effects.<br />

The suffix E <strong>for</strong> B() describes an approximation if end-to-end authentication<br />

is be<strong>in</strong>g used. In this case, only those paths are considered compromised that<br />

have at least one compromised end node. For each compromised node, there<br />

are on average 2(N − 1) paths to other nodes that are considered compromised

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!