21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Contents xi<br />

6.3 Per<strong>for</strong>mance Evaluation . . . . . . . . . . . . . . . . . . . . . 175<br />

6.3.1 S<strong>in</strong>gle Message Overhead . . . . . . . . . . . . . . . 176<br />

6.3.2 Multiple Messages Overhead . . . . . . . . . . . . . . 177<br />

6.4 Security Evaluation . . . . . . . . . . . . . . . . . . . . . . . 179<br />

6.4.1 Analytical Assessment of Resilience . . . . . . . . . . 179<br />

6.4.2 Numerical Approximation . . . . . . . . . . . . . . . 183<br />

6.4.3 Simulation Results . . . . . . . . . . . . . . . . . . . 185<br />

6.4.4 Address<strong>in</strong>g Message Injection . . . . . . . . . . . . . 190<br />

6.4.5 MAC Security . . . . . . . . . . . . . . . . . . . . . 192<br />

6.4.6 Example: A Dynamic Application Scenario . . . . . . 193<br />

6.5 Extended Interleaved Authentication . . . . . . . . . . . . . . 195<br />

6.5.1 Protocol Description . . . . . . . . . . . . . . . . . . 195<br />

6.5.2 Establish<strong>in</strong>g Shortcuts . . . . . . . . . . . . . . . . . 199<br />

6.5.3 Long-Range Interleav<strong>in</strong>gs . . . . . . . . . . . . . . . 200<br />

6.5.4 Per<strong>for</strong>mance Evaluation . . . . . . . . . . . . . . . . 205<br />

6.5.5 Security Evaluation . . . . . . . . . . . . . . . . . . . 205<br />

6.6 Compar<strong>in</strong>g Interleaved and Multipath Authentication . . . . . 207<br />

6.6.1 Multiple Physical vs. Virtual Paths . . . . . . . . . . . 207<br />

6.6.2 Comb<strong>in</strong><strong>in</strong>g Authentication Techniques . . . . . . . . . 208<br />

6.7 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 208<br />

6.7.1 Coupl<strong>in</strong>g Heterogeneous <strong>Networks</strong> . . . . . . . . . . 210<br />

6.7.2 Physical-World Examples . . . . . . . . . . . . . . . 211<br />

6.7.3 Internet Applications . . . . . . . . . . . . . . . . . . 211<br />

6.7.4 E-Mail Orig<strong>in</strong> Authentication . . . . . . . . . . . . . 212<br />

6.8 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 214<br />

6.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214<br />

7 Conclusion 217<br />

7.1 <strong>Secure</strong> <strong>Communication</strong> <strong>in</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> . . . . . 218<br />

7.1.1 Key Establishment . . . . . . . . . . . . . . . . . . . 218<br />

7.1.2 Multiple Path <strong>Communication</strong> . . . . . . . . . . . . . 218<br />

7.1.3 Interleaved Authentication . . . . . . . . . . . . . . . 219<br />

7.1.4 Shortcut Authentication . . . . . . . . . . . . . . . . 221<br />

7.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 221<br />

Bibliography 223

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!