Entry DiPietro:2008:RSN from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{DiPietro:2008:RSN,
author = "Roberto {Di Pietro} and Luigi V. Mancini and
Alessandro Mei and Alessandro Panconesi and Jaikumar
Radhakrishnan",
title = "Redoubtable Sensor Networks",
journal = j-TISSEC,
volume = "11",
number = "3",
pages = "13:1--13:??",
month = mar,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1341731.1341734",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:50 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "We give, for the first time, a precise mathematical
analysis of the connectivity and security properties of
sensor networks that make use of the random
predistribution of keys. We also show how to set the
parameters---pool and key ring size---in such a way
that the network is not only connected with high
probability via secure links but also provably
resilient, in the following sense: We formally show
that any adversary that captures sensors at random with
the aim of compromising a constant fraction of the
secure links must capture at least a constant fraction
of the nodes of the network. In the context of wireless
sensor networks where random predistribution of keys is
employed, we are the first to provide a mathematically
precise proof, with a clear indication of parameter
choice, that two crucial properties---connectivity via
secure links and resilience against malicious
attacks---can be obtained simultaneously. We also show
in a mathematically rigorous way that the network
enjoys another strong security property. The adversary
cannot partition the network into two linear size
components, compromising all the links between them,
unless it captures linearly many nodes. This implies
that the network is also fault tolerant with respect to
node failures. Our theoretical results are complemented
by extensive simulations that reinforce our main
conclusions.",
acknowledgement = ack-nhfb,
articleno = "13",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "connectivity; probabilistic key sharing; random
graphs; Wireless sensor network",
}
Related entries
- adversary,
10(4)6,
11(4)19,
11(4)23,
13(3)21,
14(4)28,
15(2)9,
15(3)12,
15(3)14,
17(2)7,
17(3)9,
17(3)11,
18(1)4,
18(2)5,
18(4)14
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- aim,
10(3)12,
12(1)4,
13(3)20,
15(3)13,
17(3)12
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- another,
1(1)26,
1(1)66,
11(3)14,
12(1)5,
12(3)18,
13(3)26,
13(4)36,
15(3)12,
15(4)18,
18(1)1
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- cannot,
1(1)66,
2(2)177,
10(2)7,
11(3)12,
12(1)5,
12(2)9,
12(3)14,
13(3)20,
13(4)39,
14(3)27,
15(2)6,
15(2)9,
15(4)17,
16(1)3,
16(4)16
- capture,
2(2)159,
9(2)162,
10(4)6,
11(3)14,
15(2)10,
16(2)8,
17(3)11,
17(4)13
- choice,
2(3)230,
10(4)5,
15(3)14,
18(1)1
- clear,
11(4)21,
12(1)2
- component,
2(1)105,
9(4)421,
13(3)24,
13(3)28,
13(4)32,
15(3)13,
16(2)5,
16(3)9,
18(2)8
- compromising,
2(3)269,
10(2)6,
13(1)8,
15(2)9,
15(3)11,
16(4)17,
17(2)7
- conclusions,
17(1)1
- connected,
17(1)3
- connectivity,
11(2)1,
11(2)2
- constant,
9(4)461,
12(3)18,
14(1)11,
14(1)12,
14(4)31
- context,
7(3)392,
10(1)2,
10(2)8,
10(3)12,
10(4)2,
11(3)16,
12(3)18,
12(4)20,
14(1)2,
14(1)4,
15(1)2,
15(2)8,
15(4)16,
17(2)7,
17(3)12,
18(3)10
- crucial,
9(2)162,
13(1)10,
16(3)10,
18(1)2
- Di Pietro, Roberto,
14(1)5,
17(3)9
- employed,
10(2)6,
12(3)16,
18(4)12
- enjoy,
14(1)5
- extensive,
10(4)1,
11(3)15,
11(4)18,
14(4)28,
17(3)9
- failure,
2(4)354,
10(4)6,
13(4)34,
14(1)3
- fault,
10(4)6,
16(3)9
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- following,
2(2)177,
11(1)3,
12(3)18,
16(3)10,
18(3)9
- formally,
1(1)26,
2(3)230,
9(4)421,
10(3)9,
10(4)2,
11(4)17,
12(2)8,
13(3)24,
13(3)27,
14(4)30,
17(1)2,
17(1)3
- fraction,
11(4)18,
14(3)27,
15(3)14
- give,
9(4)391,
10(4)6,
11(2)4,
11(4)22,
12(1)2,
12(1)6,
13(3)20,
13(3)21,
13(4)39,
14(3)26,
16(1)3,
18(1)1
- graph,
2(1)3,
2(1)105,
10(4)1,
12(1)4,
12(3)18,
15(4)18,
17(3)11,
18(4)12
- high,
1(1)3,
11(3)15,
11(4)18,
11(4)20,
12(2)11,
14(4)31,
15(2)7,
15(3)12,
16(2)6,
16(2)8,
16(3)11,
17(1)1,
17(3)11,
17(4)16,
18(2)7,
18(4)12
- how,
2(1)3,
2(2)138,
2(3)269,
7(2)319,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- imply,
11(2)6
- least,
10(2)5,
11(4)19,
14(4)28,
15(3)14,
18(1)1,
18(4)13
- linear,
11(2)1,
11(4)21,
12(3)16,
12(3)18,
12(4)20,
14(4)29,
15(1)4,
16(4)17,
17(3)11,
18(2)5,
18(2)7
- link,
10(4)6,
17(1)1,
17(2)6
- main,
10(2)5,
10(2)8,
11(4)20,
13(3)27,
13(4)41
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
14(4)29,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
15(4)17,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- Mancini, Luigi V.,
5(1)36,
5(3)332
- many,
1(1)93,
2(1)65,
2(2)159,
2(3)332,
10(1)4,
10(4)1,
11(4)22,
11(4)23,
12(1)2,
12(3)17,
12(3)18,
13(3)20,
13(3)22,
13(4)38,
13(4)39,
15(1)4,
15(2)6,
15(2)7,
16(2)5,
16(3)9,
16(4)17,
17(1)4,
17(3)12,
18(1)1,
18(4)13
- mathematical,
9(2)162
- must,
2(2)159,
2(2)177,
9(4)421,
10(3)12,
10(4)4,
13(4)40,
14(4)29,
15(2)10,
16(1)4,
17(2)6
- node,
10(1)3,
10(4)1,
10(4)6,
11(2)3,
11(3)12,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(1)7,
14(3)27,
17(4)13
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- obtained,
1(1)26,
10(1)2,
10(1)4,
10(2)8,
12(2)8,
12(3)18,
14(1)14,
16(4)14,
18(4)12
- only,
2(3)230,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- parameter,
9(4)461,
10(4)5,
12(1)2,
15(1)5,
17(3)10,
18(2)5
- partition,
10(4)6,
11(4)18
- Pietro, Roberto, Di,
14(1)5,
17(3)9
- pool,
10(3)10
- precise,
9(4)391,
14(1)3,
17(1)4,
18(1)4
- predistribution,
8(2)228,
11(2)1
- probabilistic,
11(4)18,
14(1)12,
15(3)11,
15(3)14,
15(4)15
- probability,
12(1)5,
12(2)13,
15(3)11,
16(3)11,
17(3)9,
17(4)15,
18(1)2
- proof,
1(1)93,
2(3)230,
2(3)332,
2(4)354,
9(2)181,
10(2)6,
12(1)3,
12(2)8,
13(3)20,
13(3)25,
14(1)12,
15(1)4,
17(1)4,
17(4)15,
18(1)4,
18(2)8
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- provably,
7(2)206,
10(3)10,
11(2)4,
12(3)18,
12(3)19,
12(4)21,
13(3)21,
13(4)29,
16(4)15,
17(1)4
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- random,
10(4)3,
11(2)3,
11(2)4,
11(3)15,
12(1)2,
12(3)18,
13(1)10,
14(1)12,
15(2)9,
15(3)12
- resilience,
10(4)6,
11(1)2,
14(4)28
- resilient,
10(4)6,
11(4)22,
12(4)20,
15(4)17,
17(4)13
- respect,
2(2)138,
10(4)2,
12(1)5,
13(3)22
- result,
1(1)3,
1(1)26,
2(3)230,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- rigorous,
16(2)8,
17(1)4
- ring,
11(2)1
- secure,
1(1)93,
2(2)159,
2(2)177,
2(3)332,
2(4)390,
4(1)72,
4(2)103,
4(2)134,
4(4)321,
5(3)290,
6(4)472,
7(4)523,
9(1)1,
9(1)31,
9(1)94,
9(2)162,
9(4)461,
10(2)8,
10(3)10,
10(3)11,
10(4)3,
10(4)6,
11(2)4,
11(2)5,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
12(4)22,
13(1)9,
13(3)21,
13(3)28,
13(4)29,
14(3)23,
14(3)27,
14(4)31,
15(2)6,
15(2)9,
16(3)11,
16(4)15,
17(2)5,
17(2)6,
17(4)13,
18(2)5,
18(4)13
- sense,
11(3)12,
12(1)1,
14(3)23
- sensor,
8(1)41,
8(2)228,
11(2)1,
11(3)12,
11(3)14,
11(4)18,
11(4)22,
11(4)23,
13(3)25,
17(2)5
- set,
2(1)34,
2(2)138,
2(4)390,
8(1)3,
9(4)421,
10(2)5,
10(3)12,
10(4)2,
10(4)3,
10(4)5,
11(2)1,
11(2)3,
11(4)18,
11(4)21,
12(2)11,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
13(1)9,
13(1)10,
13(3)27,
13(4)40,
14(1)12,
14(3)25,
14(4)31,
15(1)2,
15(2)7,
15(2)10,
15(3)13,
15(4)15,
16(1)4,
17(1)2,
17(2)8,
17(3)11,
17(4)13,
17(4)14,
18(1)4,
18(3)10,
18(3)11
- sharing,
2(4)354,
8(3)259,
9(4)461,
10(4)4,
11(1)3,
11(1)4,
13(4)34,
14(3)23,
17(4)13
- simulation,
10(4)6,
11(2)3,
11(3)15,
11(4)18,
11(4)22,
14(1)3,
15(3)11,
17(3)9
- simultaneously,
17(3)11
- size,
2(3)295,
10(3)11,
10(4)5,
11(2)6,
11(4)18,
12(3)16,
12(4)20,
14(1)3,
14(4)29,
17(4)15,
18(1)4,
18(4)12
- strong,
2(3)230,
2(4)390,
3(3)161,
10(3)11,
12(4)21,
13(1)7,
13(4)39,
15(1)3,
15(1)4,
16(2)6,
16(3)12,
18(1)1,
18(4)13
- theoretical,
11(1)2,
12(2)13,
13(3)27,
16(3)11,
17(3)9
- time,
2(1)105,
2(3)332,
2(4)390,
2(4)416,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
15(4)17,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)11,
17(4)13,
18(1)2,
18(1)4,
18(3)10
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- unless,
2(2)177,
10(4)3,
18(1)2
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- via,
2(3)295,
2(4)390,
9(4)461,
12(3)14,
12(3)18,
14(1)9,
16(2)7,
16(4)17,
17(2)5
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
10(4)4,
11(1)2,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- where,
2(3)230,
9(4)461,
10(4)4,
10(4)5,
10(4)6,
11(3)12,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- wireless,
7(2)319,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(2)2,
11(3)12,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5