Small worlds and the security of ubiquitous computing

The paper considers the small-world phenomenon in two contexts, ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their natural occurrence in human-centered networks and their meaning as a system design principle. The relationship of small worlds and security is examined from two viewpoints. First, results on the security of small-world networks are reviewed. Second, we look into how small-world properties are obstacles to, or can be helpful in maintaining security guarantees. We then give an example of how to improve the communication security in large-scale, self-organizing networks.

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Carson C. Chow,et al.  Small Worlds , 2000 .

[3]  B. Hayes Graph Theory in Practice: Part II , 2000, American Scientist.

[4]  Ramesh Govindan,et al.  Using the small-world model to improve Freenet performance , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[5]  Gesine Reinert,et al.  Small worlds , 2001, Random Struct. Algorithms.

[6]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[7]  J. Kleinfeld COULD IT BE A BIG WORLD AFTER ALL? THE "SIX DEGREES OF SEPARATION" MYTH , 2002 .

[8]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[9]  Frank Siegemund,et al.  A Context-Aware Communication Platform for Smart Objects , 2004, Pervasive.

[10]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[11]  Harald Vogt,et al.  Integrity preservation for communication in sensor networks , 2004 .

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[14]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[15]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[16]  Olaf Sporns,et al.  Networks analysis, complexity, and brain function , 2002 .

[17]  M. V. Valkenburg Network Analysis , 1964 .

[18]  O. Sporns Network Analysis , Complexity , and Brain Function , 2002 .