21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.4. Security Evaluation 181<br />

a sensor network. In terms of hop count, we get an average path length of<br />

L = ∆(2)W/D ≈ .52W/D<br />

hops.<br />

Now we can estimate the number of paths go<strong>in</strong>g through a s<strong>in</strong>gle node as<br />

follows. The total number of paths <strong>in</strong> the network is N(N − 1) and the average<br />

path length is denoted as L. To each position on each path, a node needs to<br />

be assigned, thus the total number of such assignments is LN(N − 1). These<br />

assignments are assumed to be equally distributed over all nodes, disregard<strong>in</strong>g<br />

border effects, so there are<br />

LN(N − 1)<br />

N<br />

= L(N − 1) (6.3)<br />

assignments per node, which equals the number of paths that each node is part<br />

of. We observe that border nodes are part of fewer paths than central ones.<br />

S<strong>in</strong>ce we are <strong>in</strong>terested <strong>in</strong> an average case analysis only, we will not deal with<br />

such effects.<br />

Under the Canvas authentication regime, a path with non-compromised endpo<strong>in</strong>ts<br />

is compromised only if there are two adjacent compromised nodes somewhere<br />

on the path. Whenever a new node is be<strong>in</strong>g compromised, all of its paths<br />

that are shared with compromised neighbours will also be compromised. The<br />

number of newly compromised paths is thus dependent on the number of compromised<br />

neighbours. We can assume that a fraction of x/N of the neighbours<br />

are already compromised. Recall from Section2.5.3 that d denotes the density<br />

of the network. Thus, L(N − 1)/d · xd/N = L(N − 1)x/N new paths are<br />

compromised. But we must be careful not to count already compromised paths<br />

s<strong>in</strong>ce a good deal of them might already be compromised by other pairs of<br />

nodes. There<strong>for</strong>e we <strong>in</strong>troduce another factor, c, which is the fraction of so far<br />

non-compromised paths:<br />

c = 1 − BC(x)<br />

N(N − 1) .<br />

Through the multiplication by c we ensure that we count only a certa<strong>in</strong> fraction<br />

of the newly compromised paths. F<strong>in</strong>ally, this yields the follow<strong>in</strong>g equation<br />

that describes the number of compromised paths when there are x compromised<br />

nodes:<br />

<br />

<br />

L(N − 1)x<br />

BC(x + 1) = BC(x) + c 2(N − 1) + (6.4)<br />

N<br />

Figures. 6.11 and 6.12 show the approximation given <strong>in</strong> equation 6.4 compared<br />

to the simulation of Canvas on the standard square. N = 500 and N =

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!