21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2. Random Key Pre-Distribution 99<br />

messages. The EG scheme is based on a pool of keys of which a subset is<br />

known to every node. Two nodes can derive a pairwise key, a l<strong>in</strong>k key, from<br />

the <strong>in</strong>tersection of their subsets. Note that here, l<strong>in</strong>k refers to a connection <strong>in</strong><br />

the authentication graph of a network, which is not necessarily equivalent to a<br />

radio l<strong>in</strong>k.<br />

Such a scheme does not provide “perfect” security s<strong>in</strong>ce it cannot be guaranteed<br />

that a derived key is known exclusively to one pair of nodes. An attacker<br />

who captures a set of nodes acquires the key material known to these nodes and<br />

can, with a certa<strong>in</strong> probability, derive from that the l<strong>in</strong>k key that has been established<br />

between two other, uncompromised nodes. Depend<strong>in</strong>g on the chosen<br />

parameters, the scheme provides a certa<strong>in</strong> resilience aga<strong>in</strong>st such attacks.<br />

Due to its probabilistic nature, the scheme cannot guarantee that two nodes<br />

will be able to establish a l<strong>in</strong>k key at all, as it is possible that the <strong>in</strong>tersection<br />

of their key material subsets is empty. The parameters can be chosen such that<br />

connectivity (i.e., the probability with which two nodes can establish a pairwise<br />

l<strong>in</strong>k key) will be high, but it will be usually below 1, and a high connectivity<br />

will lead to reduced resilience.<br />

4.2.1 A Model <strong>for</strong> Key Pre-Distribution<br />

The follow<strong>in</strong>g elements are required <strong>for</strong> a random key pre-distribution scheme.<br />

The key space def<strong>in</strong>es the set of values that are eligible as keys. These values<br />

must be of sufficient length to provide computational security when be<strong>in</strong>g used<br />

as cryptographic keys. A typical length could be 128 bit.<br />

For some pre-distribution schemes, <strong>for</strong> example full pairwise key distribution,<br />

keys are drawn from the complete key space. For random key predistribution,<br />

only a subset of the complete key space is used. This subset is<br />

randomly chosen and is called key pool K . 1 The size of the key pool determ<strong>in</strong>es<br />

the connectivity and resilience of the scheme, as we will see later. We<br />

will denote the key pool size as S.<br />

We assume that each of the N nodes has a unique identifier IDu (u ∈<br />

{1,...,N}). To each node, a set of keys is assigned, which is called a key r<strong>in</strong>g.<br />

The elements of a key r<strong>in</strong>g are selected from K by us<strong>in</strong>g a selection function<br />

F, which will be def<strong>in</strong>ed shortly. First, we def<strong>in</strong>e the follow<strong>in</strong>g elements:<br />

• K is the key pool, i.e. an ordered set of keys.<br />

1 It should be noted that some cryptographic algorithms, such as DES or Blowfish, have “weak keys”, i.e. keys<br />

with certa<strong>in</strong> properties that lead to <strong>in</strong>secure results. Although weak keys are usually very rare, one might check<br />

if the key pool conta<strong>in</strong>s such keys and replace them, if a cryptographic algorithm with weak keys is be<strong>in</strong>g used.<br />

There are no known weak keys <strong>for</strong> the current cryptographic standard AES/Rijndael.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!