Skip to main content

Edge Eavesdropping Games

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4116))

Abstract

Motivated by the proactive security problem, we study the question of maintaining secrecy against a mobile eavesdropper that can eavesdrop to a bounded number of communication channels in each round of the protocol. We characterize the networks in which secrecy can be maintained against an adversary that can eavesdrop to t channels in each round. Using this characterization, we analyze the number of eavesdropped channels that complete graphs can withhold while maintaining secrecy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beimel, A., Franklin, M.: Edge eavesdropping games (2006), http://www.cs.bgu.ac.il/~beimel/Papers/

  2. Bienstock, D., Seymour, P.: Monotonicity in graph searching. J. of Algorithms 12(2), 239–245 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  3. Buhrman, H., Garay, J.A., Hoepman, J.H.: Optimal resiliency against mobile faults. In: 25th International Symp. on Fault-Tolerant Computing, pp. 83–88 (1995)

    Google Scholar 

  4. Cai, N., Yeung, R.W.: Secure network coding. In: International Symposium on Information Theory (2002)

    Google Scholar 

  5. Feldman, J., Malkin, T., Stein, C., Servedio, R.A.: On the capacity of secure network coding. In: Proc. 42nd Annual Allerton Conference on Communication, Control, and Computing (2004)

    Google Scholar 

  6. Franklin, M., Galil, Z., Yung, M.: Eavesdropping games: a graph-theoretic approach to privacy in distributed systems. J. of the ACM 47(2), 225–243 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  7. Garay, J.A.: Reaching (and maintaining) agreement in the presence of mobile faults. In: Tel, G., Vitányi, P.M.B. (eds.) WDAG 1994. LNCS, vol. 857, pp. 253–264. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  8. Garay, J.A., Gennaro, R., Jutla, C.S., Rabin, T.: Secure distributed storage and retrieval. Theoretical Computer Science 243(1-2), 363–389 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  9. Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)

    Google Scholar 

  10. Jain, K.: Security based on network topology against the wiretapping attack. IEEE Magazine, Special issue on Topics in Wireless Security (2004)

    Google Scholar 

  11. Kirousis, L.M., Papadimitriou, C.H.: Searching and pebbling. Theoretical Computer Science 47, 205–218 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  12. LaPaugh, A.: Recontamination does not help to search a graph. J. of the ACM 40(2), 224–245 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  13. Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: Proc. of the 10th ACM Symp. on Principles of Distributed Computing, pp. 51–59 (1991)

    Google Scholar 

  14. Parsons, T.D.: Pursuit evasion in a graph. In: Theory and Application of Graphs, pp. 426–441. Springer, Heidelberg (1976)

    Google Scholar 

  15. Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28(4), 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beimel, A., Franklin, M. (2006). Edge Eavesdropping Games. In: De Prisco, R., Yung, M. (eds) Security and Cryptography for Networks. SCN 2006. Lecture Notes in Computer Science, vol 4116. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11832072_1

Download citation

  • DOI: https://doi.org/10.1007/11832072_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38080-1

  • Online ISBN: 978-3-540-38081-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics