Provable Security of Networks

نویسندگان

  • Angsheng Li
  • Yicheng Pan
  • Wei Zhang
چکیده

We propose a security hypothesis that a network is secure, if any deliberate attacks of a small number of nodes will never generate a global failure of the network, and a robustness hypothesis that a network is robust, if a small number of random errors will never generate a global failure of the network. Based on these hypotheses, we propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks. We propose a security model such that networks constructed by the model are provably secure against any attacks of small sizes under the cascading failure models, and simultaneously follow a power law, and have the small world property with a navigating algorithm of time complex O(log n). It is shown that for any network G constructed from the security model, G satisfies some remarkable topological properties, including: (i) the small community phenomenon, that is, G is rich in communities of the form X of size poly logarithmic in log n with conductance bounded by O( 1 |X|β ) for some constant β, (ii) small diameter ∗State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, P. O. Box 8718, Beijing, 100190, P. R. China. Email: {angsheng, yicheng, zhangw}@ios.ac.cn. Correspondence: {angsheng, yicheng}@ios.ac.cn. Angsheng Li is partially supported by the Hundred-Talent Program of the Chinese Academy of Sciences. All authors are supported by the Grand Project “Network Algorithms and Digital Information” of the Institute of software, Chinese Academy of Sciences, and NSFC grant No. 61161130530.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-based Key Management Scheme with Provable Security for Wireless Sensor Networks

Key management is the basis of security in wireless sensor networks. In the key management, more attentions should be paid to the public key schemes. An identity-based key management scheme for wireless sensor networks is proposed, where the node identity is used to encrypt the key generating material. The pairwise key is generated by the material ultimately. The security of the proposed scheme...

متن کامل

Provable Security of Substitution-Permutation Networks

Many modern block ciphers are constructed based on the paradigm of substitution-permutation networks (SPNs). But, somewhat surprisingly—especially in comparison with Feistel networks, which have been analyzed by dozens of papers going back to the seminal work of Luby and Rackoff—there are essentially no provable-security results about SPNs. In this work, we initiate a comprehensive study of the...

متن کامل

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution - Permutation Networks

We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical a...

متن کامل

Provably Secure Framework for Information Aggregation in Sensor Networks

Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance constraints of sensor nodes the in-network form of the aggregation is especially attractive since it allows to save expensive resources during the frequent network queries. Easy accessibility of networks and nodes an...

متن کامل

Public key encryption supporting plaintext equality test and user-specified authorization

In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext equality test from their ciphertexts. We provide a formal formulation for this primitive and present ...

متن کامل

A Key Management Scheme for Large Scale Distributed Sensor Networks

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, an efficient security mechanism was proposed for large-scale distributed sensor networks by Zhu, Setia, and Jajodia. In their scheme, each node uses a single initial key to establish pair-wise keys and erases the key after key setup. If the key is compromised...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1310.8388  شماره 

صفحات  -

تاریخ انتشار 2013