Research Article
Reliable and Secure Broadcast Communication Over Resource Constrained Systems
@INPROCEEDINGS{10.4108/ICST.VALUETOOLS2009.7643, author={Arzad A. Kherani and Skanda N. Muthaiah and Smruti Padhy and Debojyoti Bhattacharya}, title={Reliable and Secure Broadcast Communication Over Resource Constrained Systems}, proceedings={4th International ICST Conference on Performance Evaluation Methodologies and Tools}, publisher={ICST}, proceedings_a={VALUETOOLS}, year={2010}, month={5}, keywords={}, doi={10.4108/ICST.VALUETOOLS2009.7643} }
- Arzad A. Kherani
Skanda N. Muthaiah
Smruti Padhy
Debojyoti Bhattacharya
Year: 2010
Reliable and Secure Broadcast Communication Over Resource Constrained Systems
VALUETOOLS
ICST
DOI: 10.4108/ICST.VALUETOOLS2009.7643
Abstract
Compute platforms for wireless sensor networks and Vehicle-to-Vehicle (V2V) communications employ random channel access for message transmission and typically suffer from limited processing capability and on-board memory on a per-application basis because of the multiple processes going on in parallel. Appending digital signatures to transmitted messages in such systems increases information reliability, but requires an intemperate use of scarce resources, more so with an increased security requirement.
It thus appears imperative to tradeoff security for network performance to conserve scarce resources for a given resource constrained platform. This requires a good understanding of the communication performance of these systems. We observe that resource constraints in these systems induce complex interaction between the security and MAC layers at a node, obviating the possibility of layer specific optimizations to improve system performance for broadcast applications. For example, reducing the channel access probability at the MAC layer reduces collision probabilities, in turn increasing the verification load on the security layer. There is hence a need to take a holistic approach to dimension such systems to improve performance. In achieving this objective, we provide:
• an analytical framework to model these systems with or without an impersonation attacker. This analysis also takes into consideration the possibility of multiple digital signatures being attached to a message, so that the receiver has a choice of verifying one of these.
• a characterization of the stability region of the system.
• an information-theoretic approach towards reliable communication of application data over these systems. We view the combination of security-MAC-security layers as an erasure channel and provide attainable rates, jointly optimizing on sampling rate and channel transmission rate.