21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.5. Approximat<strong>in</strong>g End-to-End Security 91<br />

l<strong>in</strong>k, thus disjo<strong>in</strong>tness is required. For WSN, we should consider a different<br />

security model, which allows us to relax the disjo<strong>in</strong>tness condition. Consider<strong>in</strong>g<br />

a geometrically constra<strong>in</strong>ed attacker, the probability that a node is captured<br />

is high when one of its neighbours is captured. There<strong>for</strong>e, if a node near one<br />

of the endpo<strong>in</strong>ts is captured, it is likely that the endpo<strong>in</strong>t is captured as well.<br />

In this case, the connection is broken by def<strong>in</strong>ition. Thus, we can consider<br />

two paths as “disjo<strong>in</strong>t” if all the shared nodes between them are close to the<br />

endpo<strong>in</strong>ts, thereby <strong>in</strong>creas<strong>in</strong>g the risk of security breaches only m<strong>in</strong>imally.<br />

The most important task <strong>in</strong> a disjo<strong>in</strong>t path sett<strong>in</strong>g is to f<strong>in</strong>d or set up disjo<strong>in</strong>t<br />

paths <strong>in</strong> the first place. We will present a method, which takes the previous<br />

considerations <strong>in</strong>to account, <strong>in</strong> Chapter 5.<br />

Remark Multipath communication is very common <strong>in</strong> the physical world, although<br />

multiple paths are used rather sequentially than <strong>in</strong> parallel. One popular<br />

example is the distribution of credit cards and their associated PIN numbers.<br />

Here, separate letters are used <strong>for</strong> send<strong>in</strong>g the credit card itself and its PIN<br />

number, and one of them is sent with a delay of a few days. The underly<strong>in</strong>g<br />

assumption is that under these conditions, it is unlikely that both letters can<br />

be <strong>in</strong>tercepted by malicious parties. Another example is key distribution <strong>for</strong><br />

e-bank<strong>in</strong>g. The keys are sent by paper mail, where endpo<strong>in</strong>t verification is<br />

possible, while the actual bank<strong>in</strong>g statements etc. are sent via the Internet.<br />

3.5.3 Assess<strong>in</strong>g the Security Level<br />

When devis<strong>in</strong>g techniques that provide a level of security that is not equivalent<br />

to end-to-end security, it is helpful to be able to somehow quantify how close<br />

they are able to approximate end-to-end security. For wireless sensor networks,<br />

such a quantification is canonically based on the number of nodes that are able<br />

to communicate (or, generally, act) securely. For wireless sensor networks, we<br />

propose two measures: the fraction of node pairs that are able to communicate<br />

securely, and the number of nodes that are able to participate <strong>in</strong> agreement<br />

schemes.<br />

<strong>Secure</strong> Pairwise <strong>Communication</strong><br />

A fundamental requirement <strong>in</strong> a communication system is that two hosts can<br />

communicate securely (w.r.t. confidentiality or authenticity) with each other.<br />

The probability with which a connection provides the required security properties<br />

is an <strong>in</strong>dication of the security level the network provides. Related to

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!