21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

88 Chapter 3. A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

large parts of the memory are used <strong>for</strong> stor<strong>in</strong>g application data such as sensor<br />

read<strong>in</strong>gs and aggregated data. In pr<strong>in</strong>ciple though, deploy<strong>in</strong>g more memory<br />

would be possible.<br />

Full pairwise key distribution there<strong>for</strong>e seems to be a viable option <strong>for</strong> sensor<br />

networks. There are, however, limit<strong>in</strong>g factors:<br />

• A static distribution of keys is <strong>in</strong>flexible as it does not allow to add more<br />

nodes to the network later.<br />

• Although a certa<strong>in</strong> network size can be supported, the approach is nevertheless<br />

not scalable to larger networks, say <strong>in</strong> the order of magnitude of<br />

10 6 or larger<br />

• <strong>Sensor</strong> nodes should be as small as possible, thus the amount of memory<br />

that can be added is limited. Also, the operator of a sensor network probably<br />

prefers us<strong>in</strong>g the available memory <strong>for</strong> application purposes and is<br />

not will<strong>in</strong>g to reserve a large part of the available resources <strong>for</strong> security<br />

purposes.<br />

• Although keys are available <strong>for</strong> every pair of nodes, most of them will<br />

never be used, s<strong>in</strong>ce a sensor node will <strong>in</strong>teract with only a t<strong>in</strong>y fraction<br />

of the nodes <strong>in</strong> the network dur<strong>in</strong>g its lifetime. Thus, most of the memory<br />

used <strong>for</strong> stor<strong>in</strong>g the keys is never used productively.<br />

We conclude that up to a certa<strong>in</strong> network size, full pairwise key distribution<br />

is feasible if one is will<strong>in</strong>g to dedicate a significant amount of memory to stor<strong>in</strong>g<br />

keys. It is, however, not a generally applicable solution to the problem of<br />

secure communication. The deployment of additional nodes dur<strong>in</strong>g the lifetime<br />

of the network is not well-supported. Most importantly, the approach does not<br />

make efficient use of the available resources. For the most attractive use cases<br />

of wireless sensor networks, where nodes are very small yet there is a large<br />

number of them, this approach does not work.<br />

3.5 Approximat<strong>in</strong>g End-to-End Security<br />

As elaborated <strong>in</strong> the previous section, End-to-end security mechanisms achieve<br />

two goals: (1) <strong>Secure</strong> matchmak<strong>in</strong>g of communication partners and (2) secure<br />

message exchange. Essentially, they guarantee that dishonest parties cannot<br />

<strong>in</strong>terefere with the communication of honest parties <strong>in</strong> any way.<br />

One could relaxe these criteria to a certa<strong>in</strong> degree and demand, <strong>for</strong> example,<br />

that, say, 90% of all matchmak<strong>in</strong>gs occur between legitimate parties; or, that

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!