Escolar Documentos
Profissional Documentos
Cultura Documentos
Border
A
x
Headers
Synch Bytes
Data
CRC Bytes
There are two possibilities in this case. (i) Both packets are lost
or (ii) One with stronger signal is received.
Adversary can transmit only in the time slot allocated to
the node it is trying to masquerade as. If it transmits in the time
slot that is not allocated to the node it is masquerading as, then
it is an anomaly. Adversary can be easily detected. Let p1 be
the probability with which the packet sent by the adversary
overlaps with the packet sent by the node that the adversary is
trying to masquerade as. Let p2 be the probability with which
the adversary sends data packet at the same time as s and
collision is detected at the receiver. Let p3 be the probability
with which both packets are lost provided collision cannot be
detected. Let q be the probability with which adversary guesses
that the previous packet was lost at the receiver because of
interference. It can be noted that it is hard to guess this.
Theorem 2: The probability with which the adversary
successfully masquerades one packet is p1.(1-p2).(1-p3) + p1(1p2).p3.q.(1-p1). The probability that the adversary is detected
while masquerading m packets is 1-(p1.(1-p2).(1-p3) + p1(1p2).p3.q.(1-p1))m.
Proof: Adversary successfully masquerades a packet in 2
ways.
In the first case, adversary succeeds in masquerading a packet
when (i) the packet sent by the adversary overlaps with the one
sent by the original sender, (ii) collision cannot be detected at
the receiver and (iii) adversary has sent packet with stronger
signal. In this case receiver recovered a packet with stronger
signal and it was sent by the adversary. Since collision is not
p1
1- p2
p2
1- p3
(2k 1) R 2
...for 0<kc
4
(2k 1) R 2
=
2 A1 2 A2 .for k > c
2
W
.
where = 2 cos 1
2
(k 1) R
W
W
.
= cos 1 cos 1
kR
(k 1) R
A 1=
t (0, W)
h=kR cos(/2)
kth strip
/4+/2
r
R
W
W
A 2=
+
.
tan sin 1 c tan sin 1 c 2
k
k 1
sin + .
4 2
, , A1 and A2 are as shown in fig. 6.
/4-/2
k 2 R 2
k 2 R 2 sin cos .
2
2 2
t (0, W)
(b)
kR
A1
(a)
Fig. 7: (a) Area A1 is shown above; (b) A2 is triangle pqr.
(W, W)
A2
R
W
W
A 2=
+
.
c
c
2
tan sin 1 tan sin 1
k
k 1
sin + .....(5)
4 2
For k > c, Sk
k 2 R 2 (k 1) 2 R 2
2A1 2A2.
2
2
(2k 1) R 2
2 A1 2 A2 ....................................................(6)
=
2
By trigonometry, it can be shown (Proof is not included here
W
L1
L2
(k-1)R
A1
q
(0, 0)
(0, W)
/4+/2
r
A1
A2
k 2 R 2
.
2
Difference between the areas of sector k and (k-1) gives us the
area of the kth strip for 0<kc. Hence Sk =
Proof: Area of sector with radius kR and angle is
(2k 1) R 2
...(3)
4
Next we calculate Sk strip for k>c. To calculate Sk we find
the area of the track of width R, radius kR, angle with the
center and subtract twice the addition of areas A1 and A2. Fig.
7 shows detailed areas A1 and A2 from fig. 6.
From
fig.
7(a)
it
can
be
shown
that
k 2 R 2
k 2 R 2 sin cos .......................................(4)
2
2 2
Details of computing A1 are not included here because of space
limitations.
A 1=
W
W
...................................(7)
and = cos 1 cos 1
kR
(k 1) R
Lemma follows from (3), (4), (5), (6) and (7).
Let be the density of nodes i.e., number of nodes per unit
area. Nodes that are in direct communication range from the
aggregator form a cluster. Let Ci be the number of aggregators
in strip i.
Lemma 4: The total number of packet transmissions in one
iteration i.e., local aggregation by clusterheads and
transmission of results to the base station is
K
C i .i +
i =1
C (R 1) for
2
i =1
Ci
Si
R 2
, 1i 2 c and
K= 2 c.
Proof: Density =
i =1
i =1
C i .i +
i =1
C (R 1).
2
i =1
C .i and
i
i =1
Gto=
C (R 1).
2
i =1
i =2
i =1
IV. RESULTS
To calculate the probability of success of the SRP method,
let us assume that packet size is b bytes and the preamble of the
packet be b/10 bytes in size. We say packets overlap whenever
a small fraction of the packet overlaps. p1 is the probability
with which the adversary succeeds in guessing the time at
which the original node may send the packet. Since WSN
traffic is low and intermittent, it is safe to assume that there is
quite a bit of idle time during which nodes do not transmit even
during their allocated time slots. Hence it is difficult for an
adversary to send packet at approximately the time as the
original node so that at least some part of packets overlap at the
receiver. Therefore we consider values of p1 from 0 to 0.3 for
analysis.
When collision happens, we assume that it cannot be
detected even if only a fraction of preambles overlap. p2=1P(collision cannot be detected) =1- (2*size of preamble)/(2b)=1
- 0.1=0.9.
It is very hard for an adversary to guess that (i) previous
packet collided, (ii) collision could not be detected at receiver
and (iii) both packets were lost. But still we give benefit of
doubt to adversary and assume that adversary always succeeds
in guessing it i.e. q=1.
For the purpose of analysis we take p2=0.9 [7]. It can be
seen from figs. 8 and 9 that the probability of success is almost
1 when p1 varies from 0.1 to 0.3, p3 varies from 0.1 to 1 and m
is 1 or 2. The probability of success increases as m increase or
as p3 increases. It also increases as p1 decreases.
i =1
K
i =2
0.995
Prob of success
0.99
0.985
p1=0.1
0.98
p1=0.2
0.975
p1=0.3
0.97
0.965
0.96
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
p3
Theorem 5:
when SRP
C1 E s + C1 (R 2 1) E r
T1 E s + R1 E r +
1
Prob of success
ASRPlife =
N 1 .PWR
0.9998
0.9996
p1=0.1
0.9994
p1=0.2
0.9992
p1=0.3
0.999
0.9988
0.9986
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
p3
4600
4100
3600
3100
2600
2100
1600
1100
600
% Decrease in Lifetime
100
0.1
0.01
VI. CONCLUSIONS
0.001
% Decrease in lifetim e w hen SRP is used
% Decrease in Lifetime
25
20
15
10
5
0
1
10 11 12 13 14 15 16 17 18 19 20
%Decrease in Lifetime
1.6
[3]
1.4
20
1.2
80
1
0.8
40
0.6
[4]
60
0.4
80
100
0.2
[5]
0.
15
67
7
0.
14
10
9
0.
12
54
1
0.
10
97
4
0.
09
40
6
0.
07
83
8
0.
06
27
1
0.
04
70
3
0.
03
13
5
0.
01
56
8
[6]
Fig. 11: % Decrease in lifetime for SRP against density of nodes when
SRP is performed every 20, 40, 60, 80 and 100 iterations.
[7]