21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

100 Chapter 4. Key Establishment<br />

• S = |K | denotes the size of the key pool.<br />

• m is a global parameter and denotes the key r<strong>in</strong>g size, which is the same<br />

<strong>for</strong> all nodes.<br />

• A (pseudo-) random number sequence generator Ψ g where g acts as a<br />

seed.<br />

Ψ takes four parameters: a node identifier, a lower bound on the output,<br />

an upper bound on the output, and the number of elements <strong>in</strong> the generated<br />

sequence. Ψ may generate “real” random numbers or pseudo-random numbers.<br />

In any case, we assume that Ψ is “stable”, i.e. <strong>for</strong> the same <strong>in</strong>put, it will<br />

produce the same output <strong>in</strong> a given context (which is determ<strong>in</strong>ed by g). The<br />

produced numbers are <strong>in</strong>tegers with<strong>in</strong> the given (<strong>in</strong>clusive) bounds. If the numbers<br />

are generated pseudo-randomly, the node identifier is used as part of the<br />

seed. This enables other parties to reproduce the same sequence of numbers.<br />

As an additional constra<strong>in</strong>t, Ψ will produce any number at most once.<br />

Based on these elements, we def<strong>in</strong>e a key selection function F, which returns<br />

<strong>for</strong> a given node ID a set of keys:<br />

F(IDu) = 〈K [v1],...,K [vm]〉<br />

where Ψ g (IDu,1,S,m) = 〈v1,...,vm〉 <strong>for</strong> a given g.<br />

4.2.2 Pre-Distribution Phase<br />

The <strong>in</strong>itial phase of a key pre-distribution scheme is per<strong>for</strong>med <strong>in</strong> a secure<br />

environment, assum<strong>in</strong>g that the adversary does not have access to the nodes<br />

dur<strong>in</strong>g this phase, e.g. be<strong>for</strong>e deployment. The key distribution center (KDC)<br />

is responsible <strong>for</strong> per<strong>for</strong>m<strong>in</strong>g this <strong>in</strong>itial phase. The KDC computes <strong>for</strong> each<br />

node u the key r<strong>in</strong>g F(IDu) and loads the selected keys onto the node.<br />

There are two parameters <strong>in</strong> this scheme that can be varied and that are<br />

important regard<strong>in</strong>g the security properties of the scheme: the size S of the key<br />

pool and the size m of key r<strong>in</strong>gs. There is a trade-off between connectivity and<br />

attack resilience. The larger the key pool is, the more resilient the scheme will<br />

be aga<strong>in</strong>st an attacker, s<strong>in</strong>ce the probability that a captured node conta<strong>in</strong>s the<br />

root keys required to derive a certa<strong>in</strong> l<strong>in</strong>k key is lower. However, connectivity<br />

suffers s<strong>in</strong>ce the <strong>in</strong>tersection of the key r<strong>in</strong>gs of two nodes try<strong>in</strong>g to establish<br />

a l<strong>in</strong>k key tends to be smaller. Larger key r<strong>in</strong>gs, on the other hand, <strong>in</strong>crease<br />

connectivity as the <strong>in</strong>tersection of two key r<strong>in</strong>gs conta<strong>in</strong>s more elements. But<br />

an attacker also learns more root keys when captur<strong>in</strong>g a s<strong>in</strong>gle node, thereby<br />

<strong>in</strong>creas<strong>in</strong>g his chance to compromise a l<strong>in</strong>k key.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!