Title :
Analysis of the Authenticated Query Flooding Protocol by Probabilistic Means
Author :
Werner, Frank ; Schmitt, Peter H.
Author_Institution :
Univ. Karlsruhe, Berlin
Abstract :
Secure multicast communication is an elementary mechanism in the field of wireless sensor networks, addressing a number of security means and algorithms. Since this security is inherent with the scarce resource of energy, the endeavour in this context is to maximise security while being energy conscious and aware depending on the level of intrusion. This paper analyses the energy consumption of a secure authenticated query flooding protocol as proposed by Zenaida et al., (2006) with a formally probabilistic analysis on the basis of DTMCs. By the use of formal methods we compute for different topologies the intrinsic energy use depending on the level of intrusion. The novelty when choosing the concept of formal methods in the field of wireless sensor networks is the precision of the results. As in simulation series of experiments have to be repeated many times to reach a desired degree of confidence, the presented formal approach is computing these results with a high precision.
Keywords :
message authentication; multicast communication; probability; protocols; telecommunication security; wireless sensor networks; energy consumption; formal methods; intrusion level; probabilistic analysis; secure authenticated query flooding protocol; secure multicast communication; wireless sensor networks; Algorithm design and analysis; Application software; Authentication; Base stations; Computational modeling; Floods; Multicast communication; Multicast protocols; Wireless application protocol; Wireless sensor networks;
Conference_Titel :
Wireless on Demand Network Systems and Services, 2008. WONS 2008. Fifth Annual Conference on
Conference_Location :
Garmisch-Partenkirchen
Print_ISBN :
978-1-4244-1959-3
Electronic_ISBN :
978-1-4244-1959-3
DOI :
10.1109/WONS.2008.4459363