Secure connectivity of wireless sensor networks Ayalvadi Ganesh University of Bristol Joint work with Santhana Krishnan and D. Manjunath.

Slides:



Advertisements
Similar presentations
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
Advertisements

Routing in Poisson small-world networks A. J. Ganesh Microsoft Research, Cambridge Joint work with Moez Draief.
B ETTI NUMBERS OF RANDOM SIMPLICIAL COMPLEXES MATTHEW KAHLE & ELIZABETH MECKE Presented by Ariel Szapiro.
Complex Networks Advanced Computer Networks: Part1.
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
The Theory of Zeta Graphs with an Application to Random Networks Christopher Ré Stanford.
Occupancy Problems m balls being randomly assigned to one of n bins. (Independently and uniformly) The questions: - what is the maximum number of balls.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
Lecture 5 Graph Theory. Graphs Graphs are the most useful model with computer science such as logical design, formal languages, communication network,
A Mathematical Formalism for Agent- Based Modeling 22 nd Mini-Conference on Discrete Mathematics and Algorithms Clemson University October 11, 2007 Reinhard.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Theoretical Analysis. Objective Our algorithm use some kind of hashing technique, called random projection. In this slide, we will show that if a user.
Week 5 - Models of Complex Networks I Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
Week 4 – Random Graphs Dr. Anthony Bonato Ryerson University AM8002 Fall 2014.
Random Geometric Graph Diameter in the Unit Disk Robert B. Ellis, Texas A&M University coauthors Jeremy L. Martin, University of Minnesota Catherine Yan,
Approximating the Domatic Number Feige, Halldorsson, Kortsarz, Srinivasan ACM Symp. on Theory of Computing, pages , 2000.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Size of giant component in Random Geometric Graphs
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
1 By Gil Kalai Institute of Mathematics and Center for Rationality, Hebrew University, Jerusalem, Israel presented by: Yair Cymbalista.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Asymptotic Critical Transmission Radius for Greedy Forward Routing in Wireless Ad Hoc Networks Chih-Wei Yi Submitted to INFOCOM 2006.
The moment generating function of random variable X is given by Moment generating function.
3-1 Introduction Experiment Random Random experiment.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Decomposing Networks and Polya Urns with the Power of Choice Joint work with Christos Amanatidis, Richard Karp, Christos Papadimitriou, Martha Sideri Presented.
The Erdös-Rényi models
Efficient Gathering of Correlated Data in Sensor Networks
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
Fluid Limits for Gossip Processes Vahideh Manshadi and Ramesh Johari DARPA ITMANET Meeting March 5-6, 2009 TexPoint fonts used in EMF. Read the TexPoint.
SECT. 1.1 – DAY 2. WARM UP OBJECTIVES *Identify functions and use function notation. *Find domain and range of functions.
Graph Sparsifiers Nick Harvey Joint work with Isaac Fung TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Probability Theory Overview and Analysis of Randomized Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Efficient Key Predistribution for Grid – Based Wireless Sensor Networks.
CLT for Degrees of Random Directed Geometric Networks Yilun Shang Department of Mathematics, Shanghai Jiao Tong University May 18, 2008.
Computing with Defects
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
1 Chapter 2 Pigeonhole Principle. 2 Summary Pigeonhole principle –simple form Pigeonhole principle –strong form Ramsey’s theorem.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Chebyshev’s Inequality Markov’s Inequality Proposition 2.1.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
The walkers problem J.D., X.Perez, M.Serna, N.Wormald Partially supported by the EC 6th FP : DELIS.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Network (graph) Models
Stochastic Streams: Sample Complexity vs. Space Complexity
Probability Theory Overview and Analysis of Randomized Algorithms
Path Coupling And Approximate Counting
Spectral Clustering.
Models of Network Formation
Probability & Statistics Probability Theory Mathematical Probability Models Event Relationships Distributions of Random Variables Continuous Random.
Models of Network Formation
Chi Zhang, Yang Song and Yuguang Fang
Coverage and Connectivity in Sensor Networks
Sublinear Algorihms for Big Data
Models of Network Formation
Random Geometric Graph Diameter in the Unit Disk
Modelling and Searching Networks Lecture 5 – Random graphs
Discrete Mathematics and its Applications Lecture 5 – Random graphs
Presentation transcript:

Secure connectivity of wireless sensor networks Ayalvadi Ganesh University of Bristol Joint work with Santhana Krishnan and D. Manjunath

Problem statement N nodes uniformly distributed on unit square Pool of P cryptographic keys Each node is assigned K keys at random Two nodes can communicate if they are within distance r of each other and share a key Q: For what values of N, K, P and r is the communication graph fully connected?

Background: Random key graphs Eschenauer and Gligor (2002): Key distribution scheme for wireless sensor networks Yagan and Makowski (2012): Analysis of the full visibility case Theorem: Suppose P=  (N). Let K 2 /P = (log N+  N )/N Then, P(connected)  1 if  N  +  and P(connected)  0 if  N  

Heuristic explanation Probability of an edge between two nodes is approximately K 2 /P Mean degree of a node is approximately NK 2 /P = log N +  N Edges are not independent but, if they were: – key graph would be an Erdos-Renyi random graph – has connectivity threshold at mean node degree of log N

Background: Random geometric graphs N nodes uniformly distributed on unit square Edge probability g(x/r N ) for node pairs at distance x from each other Boolean model: g(x) = 1(x<1) Penrose: Let  Nr N 2 = log N +  N P(connected)  1 if  N , and  0 if  N 

Generalisations Mao and Anderson: – Similar model but with Poisson process of nodes on infinite plane. – Same scaling of r N – Under suitable conditions on g, show a threshold between having isolated nodes in unit square, and no components of finite order in unit square

Results for geometric key graphs Mean node degree   r 2 K 2 /P If  r 2 K 2 /P = log N + c, then P(graph is disconnected) > e  c /4 If  r 2 K 2 /P = c log N and c>1, then P(graph is connected)  1

Upper bound on connection probability Graph is disconnected if there is an isolated node P(node j is isolated)  (1  r 2 K 2 /P) N  exp(  r 2 NK 2 /P)  e  c /N Bonferroni inequality: P(there is an isolated node) ≥  i P(i is isolated)   i<j P(i and j are isolated)

Isolation of pairs of nodes

Lower bound on connection probability Approach for ER graphs – Compute probability that there is a connected component of m nodes isolated from other n  m – Take union bound over all ways of choosing m nodes out of n, and over all m between 1 and n/2

Approach for geometric key graphs Tesselate unit square with overlapping squares of side r/  2

Approach for geometric key graphs Are there disconnected components of different sizes in the unit square? Are there “locally” disconnected components of different sizes within the small squares of side r/  2, considering only nodes within that square?

Big picture of proof There are no small – size O(1) – components in the unit square disconnected from rest There are no large – size > 6 – locally disconnected components in any small square Can also bound the number of nodes in small components within a small square : very few of them So how might the graph be disconnected?

Notation N: number of nodes in unit square r: communication radius of a node P: size of key pool K: number of keys assigned to each node n=  r 2 N: expected number of nodes within communication range p=K 2 /P: approximate probability that two nodes share a key

Assumptions N,K,P ,K 2 /P  0 nK 2 /P  c log N for some c>1 K > 2 log N Corollary: – Number of nodes in each small square is  (log N) – concentrates near its mean value of n/(2  ) – uniformly over all squares

Within a small square n/(2  ) nodes, full visibility Mean degree is nK 2 /(2  P) = c/(2  ) log N Even if edges were independent, expect to see local components of size up to 2 , somewhere in the unit square Show there are no bigger components, taking edge dependence into account

Within a small square Say there is a connected component of size m isolated from the rest Say these m nodes have mK  j keys between them Then – j ≥ m  1 – None of the other n  m nodes in the square has one of these mK  j keys

Number of keys among m nodes Assign K distinct keys to first node Assign subsequent keys randomly with replacement P(collision at (i+1) th step)  i/P, independent of the past P(j collisions)  P(≥j collisions)  ?

Collision probability bounds X 1, X 2, …, X n independent Bernoulli random variables X i ~ Bern(p i ) Y = X 1 +…+X n Z is Poisson with the same mean as Y Hoeffding (1956): Z dominates Y in the convex stochastic order

Within the big square Say nodes 1,2,…,m form a connected component isolated from the rest. Then – for some permutation of 1,2,…,m there is an edge between each node and the next – they hold mK  j keys between them, for some j – there is no edge between the remaining N  m nodes and these m

Putting the pieces together Most nodes belong to a giant component Each small square may contain some nodes that are locally isolated or within small components These must either be connected to the giant component in a neighbouring cell, or to another small component Latter is unlikely, doesn’t percolate