21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2. Random Key Pre-Distribution 107<br />

degrades more steeply the more root keys are required to set up a l<strong>in</strong>k key. This<br />

behaviour is, of course, expected, s<strong>in</strong>ce the likelihood that a pair of nodes has<br />

q common root keys gets smaller with <strong>in</strong>creas<strong>in</strong>g q.<br />

4.2.7 Resilience Aga<strong>in</strong>st L<strong>in</strong>k Key Compromise<br />

Our attacker model assumes that if a node is compromised, the adversary ga<strong>in</strong>s<br />

complete access to the key material stored <strong>in</strong> that node. By collect<strong>in</strong>g the key<br />

material of various compromised nodes, the adversary may gather a significant<br />

fraction of the key pool. He might then be able to recover the l<strong>in</strong>k key established<br />

between a pair of uncompromised nodes. This would allow the adversary<br />

to eavesdrop on the communication between the nodes (if the l<strong>in</strong>k key is used<br />

<strong>for</strong> encryption) or to <strong>in</strong>ject messages <strong>in</strong>to the network with a faked orig<strong>in</strong> (if<br />

the l<strong>in</strong>k key is used <strong>for</strong> authentication).<br />

As the attack parameter, we consider the number x of captured nodes. All<br />

root keys from these nodes are available to the adversary. We denote the probability<br />

with which a l<strong>in</strong>k key can be reconstructed from this collected key material<br />

as pκ.<br />

Under the basic scheme, a l<strong>in</strong>k key is derived from exactly one root key.<br />

The probability that this key is known to another node is m S . There<strong>for</strong>e, when<br />

faced with x compromised nodes, the probability that at least one of them has<br />

knowledge of that key is<br />

<br />

pκ = 1 − 1 − m<br />

x (4.3)<br />

S<br />

Assum<strong>in</strong>g the q-composite scheme, the probability that two nodes can establish<br />

a l<strong>in</strong>k key is given by pc. The probability that a l<strong>in</strong>k key is be<strong>in</strong>g derived<br />

from i root keys is (i ≥ q):<br />

Pr[i shared]<br />

pc<br />

In accordance to the reason<strong>in</strong>g above, the expected fraction of root keys be<strong>in</strong>g<br />

compromised is 1−(1− m S )x . If i keys were <strong>in</strong>volved <strong>in</strong> deriv<strong>in</strong>g a l<strong>in</strong>k key, the<br />

probability that this l<strong>in</strong>k is compromised is (1 − (1 − m S )x ) i as all <strong>in</strong>volved root<br />

keys have to be compromised. When x nodes have been captured, the probability<br />

that a l<strong>in</strong>k key between two uncompromised nodes is be<strong>in</strong>g compromised is<br />

there<strong>for</strong>e [39]:<br />

p q κ =<br />

m <br />

∑ 1 − 1 −<br />

i=q<br />

m<br />

xi Pr[i shared]<br />

S pc<br />

(4.4)<br />

These measures of resilience show that these schemes reveal <strong>in</strong><strong>for</strong>mation<br />

about the whole network to an adversary who captures a fixed number of nodes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!