21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

114 Chapter 4. Key Establishment<br />

The resilience of the <strong>in</strong>f<strong>in</strong>ite model can be derived from the follow<strong>in</strong>g simple<br />

comb<strong>in</strong>atorial construction. We assume an urn model, with an urn <strong>in</strong>itially<br />

hold<strong>in</strong>g two blue balls and j red balls. The blue balls represent the cha<strong>in</strong> values<br />

of Alice and Bob, while the red balls represent those of Eve. The position<br />

<strong>in</strong>dices on the hash cha<strong>in</strong> are <strong>in</strong>dependently chosen. We simulate this by randomly<br />

plac<strong>in</strong>g the balls on a l<strong>in</strong>e of fixed length. We stipulate that the leftmost<br />

ball on that l<strong>in</strong>e represents the cha<strong>in</strong> value with the smallest position <strong>in</strong>dex. The<br />

ball next to it corresponds to the key with the second-smallest <strong>in</strong>dex and so on.<br />

The two left-most balls determ<strong>in</strong>e whether Alice and Bob’s key is secure or<br />

not. If these are both blue balls, their key is secure. Otherwise, at least one red<br />

ball is placed on the left from a blue ball, which means that there is at least one<br />

of Eve’s values from which the key can be constructed.<br />

There are j +2 balls <strong>in</strong> total, from which the two left-most balls are selected.<br />

Out of all possibilities to choose these two balls, only <strong>in</strong> one case two blue balls<br />

are chosen, which yields a probability <strong>for</strong> key security of<br />

β = 1<br />

j+2<br />

j<br />

=<br />

2<br />

( j + 2)( j + 1)<br />

(4.7)<br />

It turns out that the difference between β and Pr[A] is, from a practical po<strong>in</strong>t<br />

of view, quite small even <strong>for</strong> moderate sizes T . This fact is illustrated <strong>in</strong> Figure<br />

4.4. It is there<strong>for</strong>e unnecessary to use long hash cha<strong>in</strong>s <strong>in</strong> order to achieve a<br />

good approximation to the theoretically possible resilience. For practical purposes,<br />

T = 256 should be sufficient <strong>in</strong> most cases. For example, this would<br />

lead, <strong>for</strong> j = 2, to a difference of β − Pr[A] = 1.29 · 10 −3 . This means that<br />

about one <strong>in</strong> one thousand l<strong>in</strong>k keys is compromised due to the fact that hash<br />

cha<strong>in</strong>s are f<strong>in</strong>ite. Compared to the overall compromise probability of 5/6, this<br />

is a negligible fraction.<br />

4.3.5 Discussion<br />

Man-<strong>in</strong>-the-middle attack<br />

Note that the protocol as it stands does not provide any authentication of the<br />

transmitted position <strong>in</strong>dices, and the identities of the <strong>in</strong>volved nodes are not<br />

verified. This makes a man-<strong>in</strong>-the-middle attack possible. An attacker, Eve,<br />

may <strong>in</strong>tercept Alice’s message to Bob and <strong>in</strong>stead send her own position <strong>in</strong>dex<br />

to Bob. Bob would proceed, comput<strong>in</strong>g the shared key between him and<br />

Eve, but assum<strong>in</strong>g that he shares this key with Alice. Similarly, Eve tricks Alice<br />

<strong>in</strong>to establish<strong>in</strong>g a shared key with her. Every further message exchange

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!