Distinct Difference Configurations in Groups

Lead Research Organisation: Royal Holloway University of London
Department Name: Information Security

Abstract

A distinct difference configuration is a set of points on a two-dimensional grid such that the lines between any two points are pairwise distinct in either length or gradient. Such configurations may be used to create key predistribution schemes, specifically in the context of wireless sensor networks - that is, they provide a way of efficiently distributing keys in a network prior to deployment. The project considers distinct difference configurations in a group theory context. After defining the concepts of distance and difference in this context, we will investigate bounds on the size of such configurations in groups and the forms these configurations take. We will initially consider the free group, before looking at other types of group

Planned Impact

The most significant impact of the renewal of Royal Holloway's CDT in Cyber Security will be the production of at least 30 further PhD-level graduates. In view of the strong industry involvement in both the taught and research elements of the programme, CDT graduates are "industry-ready": through industry placements, they have exposure to real-world cyber security problems and working environments; because of the breadth of our taught programme, they gain exposure to cyber security in all its forms; through involvement of our industrial partners at all stages of the programme, the students are regularly exposed to the language and culture of industry. At the same time, they will continue to benefit from generic skills training, equipping them with a broad set of skills that will be of use in their subsequent workplaces (whether in academia, industry or government). They will also engage in PhD-level research projects that will lead to them developing deep topic-specific knowledge as well as general analytical skills.

One of the longer-term impacts of CDT research, expressed directly through research outputs, is to provide mechanisms that help to enhance confidence and trust in the on-line society for ordinary citizens, leading in turn to quality of life enhancement. CDT research has the potential of directly impacting the security of deployed system, for example helping to make the Internet a more secure place to do business. Moreover the work on the socio-technical dimensions of security and privacy also gives us the means to influence government policy to the betterment of society at large. Through the training component of the CDT, and subsequent engagement with industry, our PhD students are exposed to the widest set of cyber security issues and forced to think beyond the technical boundaries of their research. In this way, our CDT is training a generation of cyber security researchers who are equipped - philosophically as well as technically - to cope with whatever cyber security threats the future may bring. The programme equip students with skills that will enable them to understand, represent and solve complex engineering questions, skills that will have an impact in UK industry and academic long beyond the lifetime of the CDT.

Publications

10 25 50

Studentship Projects

Project Reference Relationship Related To Start End Student Name
EP/P009301/1 01/10/2016 31/12/2026
1955329 Studentship EP/P009301/1 01/10/2017 30/12/2021 Luke Stewart
 
Description The work is still ongoing, so the exact key findings are not yet defined. However, the aim is to extend work that has been done on key predistribution in wireless sensor networks, particularly in the context of group theory. Ideally, we will find a condition which a subset of the free group must satisfy in order to form a distinct difference configuration, a bound on the size of a distinct difference configuration in the free group, and a way to construct a distinct difference configuration of close to maximal size. We will then consider whether our findings in the free group apply to other types of groups.
Exploitation Route It is too early to give a definitive answer, as its not clear how much progress will be made before the award ends. However, any extension of the work is likely to use mathematical tools/algorithms to find a more restrictive upper bound than our own, or a way to construct a distinct difference configuration of size larger than that of any construction we formulate over the course of the award. It may also be that there are groups we do not consider during the course of the award which would be fruitful areas to apply our work to. How the work may be "put to use" is outlined in the applications section of the thesis, however the work we have done on the free group may be used in the context of a wireless sensor network distributed in the form of a tree.
Sectors Digital/Communication/Information Technologies (including Software)