21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110 Chapter 4. Key Establishment<br />

Alice<br />

0 1 2 3 4 5 6<br />

h<br />

Bob<br />

Figure 4.3: Two nodes us<strong>in</strong>g a hash cha<strong>in</strong> to agree on a key<br />

4.3 Key Agreement Based on Hash Cha<strong>in</strong>s<br />

In this section, we describe how to use hash cha<strong>in</strong>s as a means <strong>for</strong> key agreement<br />

between two parties. We exploit the fact that element q of a hash cha<strong>in</strong><br />

can be derived from element p if and only if p ≤ q.<br />

4.3.1 Hash Cha<strong>in</strong>s<br />

Let h be a one-way hash function that is publicly known. A hash cha<strong>in</strong> is a<br />

sequence<br />

σ = (zω)<br />

<strong>for</strong> 0 ≤ ω < T where T ∈ IN is the length of the hash cha<strong>in</strong>. z0 is the seed of the<br />

hash cha<strong>in</strong>. For all ω ≥ 1, the element σ[ω] = zω is obta<strong>in</strong>ed by apply<strong>in</strong>g the<br />

hash function h to the previous element of the sequence, i.e.<br />

zω = h(zω−1) = h ω (z0) .<br />

We refer to the elements of a hash cha<strong>in</strong> as (hash) cha<strong>in</strong> values. The position<br />

of a cha<strong>in</strong> value zω is that value’s <strong>in</strong>dex ω <strong>in</strong> the hash cha<strong>in</strong>. Whenever we refer<br />

to a cha<strong>in</strong> value, we implicitly assume that its <strong>in</strong>dex is also available.<br />

Assum<strong>in</strong>g that one element zu of the hash cha<strong>in</strong> is known, it is easy to compute<br />

all follow<strong>in</strong>g elements zu+v,v > 0 <strong>in</strong> the cha<strong>in</strong>. However, the one-way<br />

property of h <strong>for</strong>bids it to compute any elements of the cha<strong>in</strong> preced<strong>in</strong>g the<br />

known value. In particular, it is not possible to reconstruct the seed z0 of a hash<br />

cha<strong>in</strong> unless z0 is already known.<br />

4.3.2 S<strong>in</strong>gle-Cha<strong>in</strong> Key Agreement<br />

Key distribution The key distribution center (KDC) generates a hash cha<strong>in</strong> σ<br />

of length T . For each node X, the KDC selects randomly (and uni<strong>for</strong>mly) a<br />

position ωX on the hash cha<strong>in</strong> (0 < ωX < T ). The <strong>in</strong>dex ωX and its associated<br />

cha<strong>in</strong> value σ[ωX] is distributed to the respective node. We assume that Alice<br />

and Bob receive the cha<strong>in</strong> values σ[ωA] and σ[ωB], respectively.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!