21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

118 Chapter 4. Key Establishment<br />

σ 1<br />

15<br />

23<br />

52<br />

σ 2<br />

19<br />

41<br />

46<br />

σ 3<br />

7<br />

34<br />

77<br />

σ 4<br />

31<br />

51 51<br />

σ 5 σ 6 σ 7<br />

28<br />

43<br />

57<br />

Figure 4.5: Attack configurations<br />

After some trans<strong>for</strong>mation steps, we get<br />

1<br />

logε 1−<br />

2<br />

( j+2)( j+1)<br />

30<br />

45<br />

63<br />

< t (4.9)<br />

From this equation, we obta<strong>in</strong> that t grows with approximately the square of<br />

j if a certa<strong>in</strong> resilience has to be ma<strong>in</strong>ta<strong>in</strong>ed. Figure 4.6 illustrates this fact (a<br />

ten-fold <strong>in</strong>crease <strong>in</strong> the attacker strength roughly requires 100 times the number<br />

of cha<strong>in</strong>s to ma<strong>in</strong>ta<strong>in</strong> the same resilience).<br />

Example 4. Figure 4.5 shows an example where two nodes establish a key<br />

based on seven hash cha<strong>in</strong>s. The white boxes represent the cha<strong>in</strong> values of the<br />

two legitimate nodes. The black boxes represent those of the adversary ( j = 1).<br />

The numbers shown <strong>in</strong>dicate the position <strong>in</strong>dices of the values. The actual<br />

numbers are not important, and it is also irrelevant to which legitimate node<br />

which white box belongs. Only the position of the black box relative to the<br />

lower white box is important. The cha<strong>in</strong> value represented by the lower white<br />

box is the contribution of the hash cha<strong>in</strong> to the shared key. Here, the adversary<br />

is able to construct all but two of these contributions (σ3 and σ7 are secure). It<br />

is sufficient <strong>for</strong> one contribution to be secure to get a secure l<strong>in</strong>k key.<br />

Example 5 (Resilience of multiple hash cha<strong>in</strong>s). Let’s assume we expect an<br />

attacker of strength j = 10 and we would like to achieve a resilience of at least<br />

ε = 0.01, i.e. only one out of hundred l<strong>in</strong>k keys should be compromised. Us<strong>in</strong>g<br />

equation 4.9, we can determ<strong>in</strong>e the number of hash cha<strong>in</strong>s necessary to achieve<br />

this resilience:<br />

⎡<br />

⎤<br />

t = ⎢<br />

log 0.01<br />

<br />

1 −<br />

1<br />

2<br />

(10+2)(10+1)<br />

⎥ = 302<br />

⎥<br />

9<br />

22<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!