Edge eavesdropping games

  • Authors:
  • Amos Beimel;Matthew Franklin

  • Affiliations:
  • Department of Computer Science, Ben-Gurion University;Department of Computer Science, University of California, Davis

  • Venue:
  • SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Motivated by the proactive security problem, we study the question of maintaining secrecy against a mobile eavesdropper that can eavesdrop to a bounded number of communication channels in each round of the protocol. We characterize the networks in which secrecy can be maintained against an adversary that can eavesdrop to t channels in each round. Using this characterization, we analyze the number of eavesdropped channels that complete graphs can withhold while maintaining secrecy.