密钥预分布随机图的k-连通性

Mansi Sood, Osman Yağan
{"title":"密钥预分布随机图的k-连通性","authors":"Mansi Sood, Osman Yağan","doi":"10.1109/ISIT44484.2020.9174528","DOIUrl":null,"url":null,"abstract":"Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = \\frac{1}{{1 - \\mu }}\\left( {\\log n + (k - 2)\\log \\log n + \\omega (1)} \\right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = \\frac{1}{{1 - \\mu }}\\left( {\\log n + (k - 2)\\log \\log n - \\omega (1)} \\right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes\",\"authors\":\"Mansi Sood, Osman Yağan\",\"doi\":\"10.1109/ISIT44484.2020.9174528\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = \\\\frac{1}{{1 - \\\\mu }}\\\\left( {\\\\log n + (k - 2)\\\\log \\\\log n + \\\\omega (1)} \\\\right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = \\\\frac{1}{{1 - \\\\mu }}\\\\left( {\\\\log n + (k - 2)\\\\log \\\\log n - \\\\omega (1)} \\\\right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.\",\"PeriodicalId\":159311,\"journal\":{\"name\":\"2020 IEEE International Symposium on Information Theory (ISIT)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Symposium on Information Theory (ISIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT44484.2020.9174528\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT44484.2020.9174528","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

随机密钥预分配方案是实现无线传感器网络安全通信的可行方案。本文分析了Chan等人提出的随机密钥对预分配方案下异构WSN的可靠连通性。根据该方案,n个传感器节点中的每一个都被分类为类型1(分别为,类型2),其概率为μ(分别为,1−μ),其中0 < μ < 1。每个1型(分别,2型)节点与随机均匀选择的1个(分别,Kn)其他节点配对;然后为每对配对分配一个唯一的配对密钥,以便它们可以安全地相互通信。在设计安全的异构WSNs时,一个主要问题是如何选择n、μ和Kn参数,使网络高概率地表现出某些期望的特性。特别有趣的是连通性的强度,通常用k-连通性来研究;即,当k = 1,2,…时,尽管移除任何k−1个节点或链路,网络仍保持连接的性质。本文通过对非齐次随机K-out图模型的分析,回答了这一问题。最近证明,当且仅当Kn = ω(1)时,此图是渐近几乎肯定的1连通。这里,我们表明,当k = 2,3,…时,我们需要设置${K_n} = \frac{1}{{1 - \mu }}\left( {\log n + (k - 2)\log \log n + \omega (1)} \right)$使网络a.a.s.为k连通。结果以0 - 1定律的形式给出,表明当${K_n} = \frac{1}{{1 - \mu }}\left( {\log n + (k - 2)\log \log n - \omega (1)} \right)$时网络a.a.s.为非k连通。我们给出了仿真结果来证明结果在有限节点状态下的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes
Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = \frac{1}{{1 - \mu }}\left( {\log n + (k - 2)\log \log n + \omega (1)} \right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = \frac{1}{{1 - \mu }}\left( {\log n + (k - 2)\log \log n - \omega (1)} \right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信