Compute platforms for wireless sensor networks and Vehicle- To-Vehicle (V2V) communications employ random channel access for message transmission and typically suffer from limited processing capability and on-board memory on a per-application basis because of the multiple processes going on in parallel. Appending digital signatures to transmitted messages in such systems increases information reliability, but requires an intemperate use of scarce resources, more so with an increased security requirement. It thus appears imperative to tradeoff security for network performance to conserve scarce resources for a given resource constrained platform. This requires a good understanding of the communication performance of these systems. We ob- serve that resource constraints in these systems induce com- plex interaction between the security and MAC layers at a node, obviating the possibility of layer specific optimizations to improve system performance for broadcast applications. For example, reducing the channel access probability at the MAC layer reduces collision probabilities, in turn increasing the verification load on the security layer. There is hence a need to take a holistic approach to dimension such sys- Tems to improve performance. In achieving this objective, we provide: • an analytical framework to model these systems with or without an impersonation attacker. This analysis also takes into consideration the possibility of multiple digital signatures being attached to a message, so that the receiver has a choice of verifying one of these. • a characterization of the stability region of the system. • an information-theoretic approach towards reliable com- munication of application data over these systems. We view the combination of security-MAC-security layers as an erasure channel and provide attainable rates, jointly optimizing on sampling rate and channel trans- mission rate. Copyright © 2009 ICST.
CITATION STYLE
Kherani, A. A., Muthaiah, S. N., Padhy, S., & Bhattacharya, D. (2009). Reliable and secure broadcast communication over resource constrained systems. In VALUETOOLS 2009 - 4th International Conference on Performance Evaluation Methodologies and Tools. ICST. https://doi.org/10.4108/ICST.VALUETOOLS2009.7643
Mendeley helps you to discover research relevant for your work.