EnergyMemorySecurity tradeoffs in Distributed Sensor Networks - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

EnergyMemorySecurity tradeoffs in Distributed Sensor Networks

Description:

Energy-Memory-Security tradeoffs in Distributed Sensor Networks ... DSN security challenges. Due to the nature: scalability, power and adaptability ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 13
Provided by: yho
Category:

less

Transcript and Presenter's Notes

Title: EnergyMemorySecurity tradeoffs in Distributed Sensor Networks


1
Energy-Memory-Security tradeoffs in Distributed
Sensor Networks
  • David D. Hwang, Bo-Cheng Charles Lai and Ingrid
    Verbauwhede
  • UCLA, USA
  • ADHOC-NOW 2004

2005.9.22 Presented by Kim Young-hoon
2
Outline
  • Introduction
  • Cluster Key Grouping
  • Energy-Memory Tradeoffs
  • Security Tradeoffs
  • Conclusion

3
Introduction
  • DSN security challenges
  • Due to the nature scalability, power and
    adaptability
  • Resource constraints processing ability, memory
    and energy
  • Security architecture design goal
  • Minimizing transmission cost
  • Considerations on tradeoffs between other
    resources and robustness of the security
    mechanism

4
Cluster Key Grouping
  • Before deployment
  • A key pool of P keys is generated off-line
  • Each node has C clusters of keys, each cluster
    having a width of W keys (Total of keys stored
    in each node is K CW)
  • All nodes have same of clusters C and same
    cluster width W
  • Upon deployment
  • Each node broadcast the starting address of each
    of its C clusters
  • If two nodes share at least one key, a connection
    can be established on the shared key

5
Cluster Key Grouping
  • How to build up the investigation
  • From desired graph connectivity (Pc), desired
    overlap probability (p) can be determined (by L.
    Eschenauer and V. Herrin)
  • p is derived as a function of the number of
    clusters C
  • For a certain cluster size C, the cluster width
    W is determined
  • Satisfied pairs when P10000, p0.40
  • (W,C) (1,51), (2001,1),

6
Energy-Memory Tradeoffs
  • Tradeoffs between energy and memory
  • Required total transmission energy (Eb Joules
    per bit)
  • Total memory requirement of each node
  • Corner cases of cluster key grouping
  • (Eb21mJ/bit, P10000, keysize64, desired
    p0.4)

7
Energy-Memory Tradeoffs
  • Memory Energy vs. Clusters

8
Security Tradeoffs
  • Compromise factor
  • Compromise factor is the number of keys
    compromised divided by the key pool (if a single
    node is compromised)
  • compromise factor K/P
  • Security Leakage factor (SLF)
  • Quantifying the effects of a compromise on the
    security architecture
  • security leakage factor 1swcompromise factor
  • sw security weight, roughly quantify the
    importance a security compromise has to a network

9
Security Tradeoffs
  • SME curve
  • Security leakage factor, Memory and Energy
  • SME curves for different security factors

10
Security Tradeoffs
  • SME curve
  • SME curves for different security factors (cont)

11
(No Transcript)
12
Conclusion
  • By designing for the minimum of the SME curve,
    tradeoffs between energy, memory, and security
    can be taken into account
Write a Comment
User Comments (0)
About PowerShow.com