Provable Security of Networks
نویسندگان
چکیده
We propose a security hypothesis that a network is secure, if any deliberate attacks of a small number of nodes will never generate a global failure of the network, and a robustness hypothesis that a network is robust, if a small number of random errors will never generate a global failure of the network. Based on these hypotheses, we propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks. We propose a security model such that networks constructed by the model are provably secure against any attacks of small sizes under the cascading failure models, and simultaneously follow a power law, and have the small world property with a navigating algorithm of time complex O(log n). It is shown that for any network G constructed from the security model, G satisfies some remarkable topological properties, including: (i) the small community phenomenon, that is, G is rich in communities of the form X of size poly logarithmic in log n with conductance bounded by O( 1 |X|β ) for some constant β, (ii) small diameter ∗State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, P. O. Box 8718, Beijing, 100190, P. R. China. Email: {angsheng, yicheng, zhangw}@ios.ac.cn. Correspondence: {angsheng, yicheng}@ios.ac.cn. Angsheng Li is partially supported by the Hundred-Talent Program of the Chinese Academy of Sciences. All authors are supported by the Grand Project “Network Algorithms and Digital Information” of the Institute of software, Chinese Academy of Sciences, and NSFC grant No. 61161130530.
منابع مشابه
Identity-based Key Management Scheme with Provable Security for Wireless Sensor Networks
Key management is the basis of security in wireless sensor networks. In the key management, more attentions should be paid to the public key schemes. An identity-based key management scheme for wireless sensor networks is proposed, where the node identity is used to encrypt the key generating material. The pairwise key is generated by the material ultimately. The security of the proposed scheme...
متن کاملProvable Security of Substitution-Permutation Networks
Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly—especially in comparison with Feistel networks, which have been analyzed by dozens of papers going back to the seminal work of Luby and Rackoff—there are essentially no provable-security results about SPNs. In this work, we initiate a comprehensive study of the...
متن کاملPractical and Provable Security against Differential and Linear Cryptanalysis for Substitution - Permutation Networks
We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical a...
متن کاملProvably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance constraints of sensor nodes the in-network form of the aggregation is especially attractive since it allows to save expensive resources during the frequent network queries. Easy accessibility of networks and nodes an...
متن کاملPublic key encryption supporting plaintext equality test and user-specified authorization
In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext equality test from their ciphertexts. We provide a formal formulation for this primitive and present ...
متن کاملA Key Management Scheme for Large Scale Distributed Sensor Networks
To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, an efficient security mechanism was proposed for large-scale distributed sensor networks by Zhu, Setia, and Jajodia. In their scheme, each node uses a single initial key to establish pair-wise keys and erases the key after key setup. If the key is compromised...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1310.8388 شماره
صفحات -
تاریخ انتشار 2013