Princess Jahan's Tuition Classes, a story for entertainment
104 Icdcit05
1. A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor Network Debapriyay Mukhopadhyay and Suman Roy
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17. Game Graph s 0 s 3 s 1 s 2 ĥ(m, j, k) tag = h k jk (m) (m*, tag*) Rejects with prob. P secure ĥ(m, j, k) tag = h k jk (m) Accepts with prob. 1 - P secure S 1 ={s 0 , s 1 }; S 2 ={s 2 }; S O = {s 3 } δ ( s 3 ) = μ ( ε D(S)) s.t. μ (s 0 )= P secure & μ (s 1 )=1 - P secure