Connectivity in wireless networks with dynamic key compromise and recovery

Satashu Goel, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations

    Abstract

    This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity in large networks. A queuing model with a finite buffer is used to model the dynamics of key compromise. The exact distribution of the fraction of keys compromised is obtained. The result of the queuing analysis is used to determine the probability of outage, where an outage occurs whenever instantaneous end-to-end connectivity, in percolation sense, is not present. Numerical results show that in order to obtain a low outage probability, it is critical that key compromises are detected accurately, and that the average key recovery rate has a weak influence on the outage probability. Thus, for the same average key recovery rate the system must be designed to have a high key recovery probability rather than a large number of key recoveries per unit time with a low key recovery probability.

    Original languageEnglish (US)
    Title of host publication2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
    Pages1144-1149
    Number of pages6
    DOIs
    StatePublished - 2010
    Event2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010 - Istanbul, Turkey
    Duration: Sep 26 2010Sep 30 2010

    Publication series

    NameIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC

    Other

    Other2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
    CountryTurkey
    CityIstanbul
    Period9/26/109/30/10

    All Science Journal Classification (ASJC) codes

    • Electrical and Electronic Engineering

    Fingerprint Dive into the research topics of 'Connectivity in wireless networks with dynamic key compromise and recovery'. Together they form a unique fingerprint.

    Cite this