21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2. Random Key Pre-Distribution 101<br />

4.2.3 Identity-based Key R<strong>in</strong>gs<br />

The selection of keys <strong>in</strong> a key r<strong>in</strong>g can be entirely random, as it has been <strong>in</strong>itially<br />

proposed by Eschenauer and Gligor. Alternatively, it can be based on<br />

a public pseudo-random sequence of <strong>in</strong>dices that is derived from the identity<br />

of the node (as proposed by Zhu et al. [204]). This identity-based selection<br />

of keys has the advantage that dur<strong>in</strong>g the key agreement phase, nodes have to<br />

exchange only their IDs <strong>in</strong> order to be able to reconstruct which keys the other<br />

node holds. It has the additional advantage of provid<strong>in</strong>g a k<strong>in</strong>d of entity authentication.<br />

More precisely, by verify<strong>in</strong>g that a node has knowledge of a specific<br />

set of keys, it is established that this node belongs to the group of nodes that<br />

are legitimatly participat<strong>in</strong>g <strong>in</strong> the network’s operation.<br />

S<strong>in</strong>ce the generator Ψ is accessible to all nodes, every node can determ<strong>in</strong>e<br />

the <strong>in</strong>dices of the keys <strong>in</strong> any other node’s key r<strong>in</strong>g, if the other node’s identity<br />

is known. However, the actual keys are not disclosed. Thereby, nodes can<br />

determ<strong>in</strong>e their common set of keys, but a party that does not know the keys <strong>in</strong><br />

advance will not learn them.<br />

4.2.4 Establish<strong>in</strong>g the Common Key Set<br />

In order to derive a l<strong>in</strong>k key, two nodes have to learn which of the nodes from<br />

the key pool they have <strong>in</strong> common. There are several possibilities <strong>for</strong> that, with<br />

different advantages and disadvantages.<br />

As proposed <strong>in</strong> [64], a node can simply broadcast the <strong>in</strong>dices of the keys <strong>in</strong><br />

its key r<strong>in</strong>g. Neighbours overhear<strong>in</strong>g this message compare the <strong>in</strong>dices to their<br />

own and decide whether they are able to establish a l<strong>in</strong>k key to the broadcast<strong>in</strong>g<br />

node.<br />

When key r<strong>in</strong>gs are selected based on a node’s identity, it is sufficient that<br />

a node broadcasts its own ID. Nodes that receive that message can derive the<br />

set of of key <strong>in</strong>dices from that ID and determ<strong>in</strong>e the shared set of keys. This is<br />

easily achieved by mak<strong>in</strong>g the follow<strong>in</strong>g function available to each node:<br />

ψ(IDu) = Ψ g (IDu,1,S,m) .<br />

(S<strong>in</strong>ce stor<strong>in</strong>g the complete output of Ψ dur<strong>in</strong>g the pre-distribution phase <strong>in</strong><br />

each node is <strong>in</strong>feasible, this is only efficient if Ψ generates its output pseudorandomly,<br />

<strong>for</strong> example based on a hash function, such that a node can do this<br />

calculation itself.)<br />

These two approaches have the disadvantage that an adversary learns which<br />

keys (more precisely, their <strong>in</strong>dices) are conta<strong>in</strong>ed <strong>in</strong> a node’s key r<strong>in</strong>g. This<br />

might facilitate certa<strong>in</strong> attacks s<strong>in</strong>ce the adversary can now selectively target

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!