21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

94 Chapter 3. A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

we consider the ability of a network to reach consensus useful as a means <strong>for</strong><br />

compar<strong>in</strong>g authentication schemes. Authentication based on pairwise keys provides<br />

the highest security level <strong>in</strong> this framework, s<strong>in</strong>ce it prevents the adversary<br />

from manipulat<strong>in</strong>g messages. This allows secure communication among<br />

all pairs of uncompromised nodes. Alternative authentication schemes, as described<br />

<strong>in</strong> chapters 6 and 5, provide secure communication only <strong>for</strong> a fraction<br />

of the node pairs. This reduces the ability of the uncompromised nodes to<br />

reach a network-wide consensus. The fraction of nodes still able to participate<br />

<strong>in</strong> this network-wide consensus yields a quantitative measure <strong>for</strong> the provided<br />

security.<br />

Bibliographic notes The problem of Byzant<strong>in</strong>e agreement has been def<strong>in</strong>ed by<br />

Lamport, Shostak, and Pease [138, 108]. <strong>Protocols</strong> and complexity bounds <strong>for</strong><br />

distributed consensus are presented <strong>in</strong> an accessible way <strong>in</strong> the book by Nancy<br />

Lynch [119].<br />

3.6 Related Work<br />

The standard attacker model <strong>in</strong> cryptographic research has been def<strong>in</strong>ed by<br />

Dolev and Yao [57]. It assumes a distributed system <strong>in</strong> which hosts communicate<br />

by exchang<strong>in</strong>g messages. It considers two (or more) honest parties that<br />

are try<strong>in</strong>g to communicate, while the attacker tries to tamper with this communication.<br />

The attacker is assumed to be nearly omnipotent, hav<strong>in</strong>g access to all<br />

communications and be<strong>in</strong>g able to suppress or fabricate messages. He is only<br />

limited by cryptography, which is assumed to be secure. This model has proven<br />

to be useful <strong>for</strong> the analysis of cryptographic protocols. However, as discussed<br />

<strong>in</strong> [45] with<strong>in</strong> the context of ubiquitous comput<strong>in</strong>g, often other threat models<br />

are more useful <strong>for</strong> the analysis of security protocols. In such sett<strong>in</strong>gs, additional<br />

security assumptions are be<strong>in</strong>g made that allow to relax the Dolev-Yao<br />

model by go<strong>in</strong>g beyond the availability of unbreakable cryptographic primitives.<br />

One condition, which is often fulfilled <strong>in</strong> practice, is the existence of a lowbandwidth<br />

but secure channel that can be used <strong>for</strong> a short period of time. One<br />

example where this is exploited is the “pair<strong>in</strong>g” of consumer Bluetooth devices.<br />

Here, the (human) user enters the same random code on both devices. This code<br />

is then used as a seed <strong>for</strong> creat<strong>in</strong>g a secret key [106] that allows future secure<br />

communication between these devices. The underly<strong>in</strong>g assumption is that the<br />

attacker does not have access to the codes entered by the user.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!