Computer Architecture Lab. Hanbit Kim 2008. 12. 4 Contents Introduction Problem & Answer Network Model Problem Formulation Properties of Secure Graph Conclusion Discussion 2/17 Introduction Wireless Ad Hoc Networks (WANET) Wireless networks without the support of centralized network management 3/17 Introduction Security architecture with selforganization Users prefer to join and leave the network at random. Without the trusted third party How to exploit primary security associations (SA) for secure connectivity 4/17 Question & Answer Question What is the minimum fraction of primary SAs for securing all the links? Answer When the average number of authenticated neighbors of each node is Θ(1) 5/17 Network Model Physical Graph Local TrustAugmented Graph G(Χ , Ε ) Secure G(Χn, ΕGraph ) n pl SA Isolated G(Χn, Ε’sl) node Cluster Cluster Secure Graph G(Χn, Εsl) 6/17 Network Model r Communication range Pf Probability that two nodes which meet as neighbors will be friends k Pf • nπr2 Expected value of the number of neighboring friends 7/17 Assumptions Nodes are distributed uniformly at random. SAs are always symmetric. Physical Graph G(Χn, Εpl) is connected. Trust Graph G(Χn, ΕSA) is connected. 8/17 Problem Formulation Constructing a secure path between an arbitrary pair of nodes Χn Χn What should k be? We must avoid routing-security dependency loop. 9/17 Properties of Secure Graph Theorem 1: For secure graph G(Χn, Εsl), there is a critical threshold kc = log(n). If k > kc then G(Χn, Εsl) is connected. 10/17 Properties of Secure Graph Theorem 2: For secure graph G(Χn, Εsl), there is a percolation threshold kp . pf 0.1 Approximately, kp 4.5 1 0.1 If k > kp then there is only one infinite- order cluster. 11/17 Properties of Secure Graph Connected Phase k > kc The secure graph G(Χn, Εsl) is connected. There is only one cluster. 12/17 Properties of Secure Graph Supercritical Phase kp < k <= kc The secure graph G(Χn, Εsl) consist of one infinite-order cluster and isolated nodes. Handling isolated nodes 13/17 Properties of Secure Graph 14/17 Properties of Secure Graph Subcritical phase k < kp = 4.5 The network consists of small clusters. The network cannot achieve secure connectivity. 15/17 Conclusion The secure graph is at least in the supercritical phase. Achieve secure connectivity when the average number of authenticated neighbors is at least Ω(1). 16/17 Discussion Not uniform distribution Not connected trust graph 17/17
© Copyright 2026 Paperzz