21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

102 Chapter 4. Key Establishment<br />

nodes and try to capture them <strong>in</strong> order to obta<strong>in</strong> certa<strong>in</strong> keys which he does<br />

not yet possess. The first approach has the additional disadvantage that the<br />

broadcast messages are quite large, compris<strong>in</strong>g at least mlog 2 S bits of <strong>in</strong>dex<br />

<strong>in</strong><strong>for</strong>mation.<br />

Another possibility is to broadcast the key <strong>in</strong>dices only <strong>in</strong> an <strong>in</strong>direct manner.<br />

As proposed similarly <strong>in</strong> [143], a node broadcasts the follow<strong>in</strong>g <strong>in</strong><strong>for</strong>mation:<br />

α,H(x0,α),H(x1,α),...,H(xk−1,α)<br />

where α is a random nonce, H is a keyed hash function, and xi are the keys from<br />

the node’s key r<strong>in</strong>g. A value H(·) is called a hash commitment. An overhear<strong>in</strong>g<br />

node computes H(yi,α) <strong>for</strong> every key yi <strong>in</strong> its own key r<strong>in</strong>g. By compar<strong>in</strong>g the<br />

results to the received values, it can determ<strong>in</strong>e which node it shares with the<br />

broadcast<strong>in</strong>g node.<br />

This last approach has the advantage that it does not reveal any <strong>in</strong><strong>for</strong>mation<br />

about the key <strong>in</strong>dices unless the correspond<strong>in</strong>g keys are already known. There<strong>for</strong>e,<br />

it does not help an adversary to focus his attack on certa<strong>in</strong> nodes. On the<br />

other hand, overhear<strong>in</strong>g nodes have to per<strong>for</strong>m a moderate number of computations.<br />

They have to execute m applications of function H and m 2 comparisons<br />

(each of their own results with each of the received values). Also, the broadcast<br />

message is quite large.<br />

Note that <strong>in</strong> [143], <strong>in</strong>stead of a keyed hash function, encryption and decryption<br />

operations were used. The broadcast<strong>in</strong>g node encrypts α with each of its<br />

keys, and a receiver decrypts every value with each of its keys, result<strong>in</strong>g <strong>in</strong> m 2<br />

decryptions. Additionally, the m 2 comparisons are still necessary. By elim<strong>in</strong>at<strong>in</strong>g<br />

the need to apply each key to each of the transmitted values, our version<br />

reduces complexity from O(m 2 + m 2 ) to O(m + m 2 ) on the receiver’s side.<br />

Send<strong>in</strong>g hash commitments uses a lot of bandwidth. The output of a hash<br />

function has n bits (e.g. n = 160 <strong>for</strong> SHA-1), and is considered completely<br />

random. The size of a broadcast message can be reduced by <strong>in</strong>clud<strong>in</strong>g not<br />

the full hash commitments, but only a substr<strong>in</strong>g <strong>for</strong> each of them. Instead of<br />

n bits, only k < n bits could be transmitted <strong>for</strong> each hash commitment. The<br />

comparisons are then based on these substr<strong>in</strong>gs. S<strong>in</strong>ce they are smaller, the<br />

likelihood that a comparison yields a false positive result is higher than <strong>for</strong> the<br />

full length.<br />

The impact of a false positive match would be that a node assumes that its<br />

set of shared keys with another node is larger than it is <strong>in</strong> reality. This leads<br />

to an attempt at establish<strong>in</strong>g a shared key based on this extended set of keys,<br />

which would fail. The nodes would then not be able to communicate securely.<br />

There<strong>for</strong>e, we would like to keep the probability of such an event as small as

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!