21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

viii Contents<br />

2.5.2 Small-World <strong>Networks</strong> . . . . . . . . . . . . . . . . . 32<br />

2.5.3 Fundamental Properties of <strong>Sensor</strong> Network Graphs . . 33<br />

2.6 Simulation of <strong>Sensor</strong> <strong>Networks</strong> . . . . . . . . . . . . . . . . . 35<br />

2.6.1 Applications of Simulation . . . . . . . . . . . . . . . 35<br />

2.6.2 Node-based Simulation . . . . . . . . . . . . . . . . . 38<br />

2.6.3 Network-based Simulation . . . . . . . . . . . . . . . 40<br />

2.7 Security Requirements . . . . . . . . . . . . . . . . . . . . . 41<br />

2.7.1 Message Transmission . . . . . . . . . . . . . . . . . 42<br />

2.7.2 Rout<strong>in</strong>g . . . . . . . . . . . . . . . . . . . . . . . . . 43<br />

2.7.3 Access Control . . . . . . . . . . . . . . . . . . . . . 44<br />

2.7.4 Data Aggregation . . . . . . . . . . . . . . . . . . . . 45<br />

2.7.5 Location Verification . . . . . . . . . . . . . . . . . . 46<br />

2.7.6 Intrusion Detection . . . . . . . . . . . . . . . . . . . 47<br />

2.7.7 Intrusion Tolerance . . . . . . . . . . . . . . . . . . . 48<br />

2.7.8 Availability . . . . . . . . . . . . . . . . . . . . . . . 49<br />

2.8 Cryptography <strong>for</strong> <strong>Sensor</strong> <strong>Networks</strong> . . . . . . . . . . . . . . . 50<br />

2.8.1 Hash Functions . . . . . . . . . . . . . . . . . . . . . 51<br />

2.8.2 Message Authentication Codes . . . . . . . . . . . . . 52<br />

2.8.3 Symmetric Ciphers . . . . . . . . . . . . . . . . . . . 53<br />

2.8.4 Implementation . . . . . . . . . . . . . . . . . . . . . 53<br />

2.8.5 Bandwidth Overhead . . . . . . . . . . . . . . . . . . 54<br />

2.8.6 Key Management . . . . . . . . . . . . . . . . . . . . 55<br />

2.9 Exist<strong>in</strong>g Approaches to <strong>Wireless</strong> <strong>Sensor</strong> Network Security . . 57<br />

2.9.1 Key Distribution and Agreement . . . . . . . . . . . . 58<br />

2.9.2 <strong>Secure</strong> <strong>Communication</strong> . . . . . . . . . . . . . . . . . 59<br />

2.9.3 <strong>Secure</strong> Rout<strong>in</strong>g . . . . . . . . . . . . . . . . . . . . . 61<br />

2.9.4 Available Implementations . . . . . . . . . . . . . . . 63<br />

2.10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64<br />

3 A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> 65<br />

3.1 Attack Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

3.1.1 Physical Attacks . . . . . . . . . . . . . . . . . . . . 67<br />

3.1.2 Interface Attacks . . . . . . . . . . . . . . . . . . . . 69<br />

3.1.3 Software-Level Attacks . . . . . . . . . . . . . . . . . 70<br />

3.2 Attack Objectives . . . . . . . . . . . . . . . . . . . . . . . . 72<br />

3.2.1 Properties of Resources . . . . . . . . . . . . . . . . . 72<br />

3.2.2 Resource Types . . . . . . . . . . . . . . . . . . . . . 73<br />

3.2.3 Detection Evasion . . . . . . . . . . . . . . . . . . . 77<br />

3.3 Adversary Characteristics . . . . . . . . . . . . . . . . . . . . 78

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!