Affiliation:
1. School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China
2. Purple Mountain Laboratories, Nanjing, Jiangsu, China
Abstract
Random forwarding networks play a significant role in solving security and load balancing problems. As a random quantity easily obtained by both sender and receiver, the end-to-end delay of random forwarding networks can be utilized as an effective random source for cryptography-related applications. In this paper, we propose a mathematical model of Random forwarding networks and give the calculation method of end-to-end delay distribution. In exploring the upper limit of the randomness of end-to-end delay, we find that the end-to-end delay collision of different forwarding routes is the main reason for the decrease of end-to-end delay randomness. Some of these collisions can be optimized by better network deployment, while others are caused by some interesting network topology, which is unavoidable. For further analysis, we propose an algorithm to calculate the inevitable collision in random forwarding networks skillfully by using Symbol Matrix, and we give the optimal node forwarding strategy with the maximum randomness of the end-to-end delay for a given number of middle forwarding nodes and forwarding times. Finally, we introduce a specific application of generating symmetric keys by using the randomness of the end-to-end delay.
Funder
National Key Research and Development Program of China
Reference25 articles.
1. A structural analysis of network delay;Abdelkefi,2011
2. RSS-based secret key generation in wireless in-body networks;Awan,2019
3. Keying hash function for message authentication;Bellare;Lecture Notes in Computer Science,1996
4. Convex Optimization
5. Analysis of point-to-point packet delay in an operational network;Choi,2004
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献