21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.7. Summary 127<br />

The security of the scheme is discussed, as <strong>in</strong> our work, <strong>in</strong> terms of the<br />

probability with which an attacker can eavesdrop on a pairwise key. While they<br />

derive upper bounds <strong>for</strong> this probability, we provide an exact comb<strong>in</strong>atorial<br />

derivation as well as an approximation that is well-suited <strong>for</strong> practical purposes.<br />

Comb<strong>in</strong>ation of random key pre-distribution and hash cha<strong>in</strong>s The comb<strong>in</strong>ation of<br />

the hash-based scheme with random key pre-distribution schemes has been <strong>in</strong>dependently<br />

described by Ramkumar and Memon [148], who call this scheme<br />

“hashed random preloaded subsets” (HARPS). Us<strong>in</strong>g a similar methodical approach,<br />

they arrive at basically the same conclusions as us.<br />

4.7 Summary<br />

The tight resource contra<strong>in</strong>ts on nodes <strong>in</strong> wireles sensor networks, both <strong>in</strong> computational<br />

and storage terms, make traditional key management mechanisms<br />

based on public-key cryptography largely impractical. Nevertheless, security<br />

goals like resilience aga<strong>in</strong>st eavesdropp<strong>in</strong>g, impersonation, and the creation of<br />

fake identities should be achieved. On the other hand, wireless sensor networks<br />

are constra<strong>in</strong>ed <strong>in</strong> several regards that make it possible to rely on certa<strong>in</strong><br />

assumptions when design<strong>in</strong>g appropriate key management mechanisms. It can<br />

be assumed that all nodes <strong>in</strong> the network orig<strong>in</strong>ate from the same adm<strong>in</strong>istrative<br />

doma<strong>in</strong>, the set of nodes is known be<strong>for</strong>e deployment and relatively static<br />

throughout the network’s lifetime, the number of secure associations per node<br />

is small compared to the overall size of the network, and the contribution of a<br />

s<strong>in</strong>gle node to the overall functionality of the network is also relatively small.<br />

The key agreement schemes discussed <strong>in</strong> this chapter are designed to be applicable<br />

<strong>in</strong> wireless sensor networks as their resource consumption is very low.<br />

They require a moderate memory size, which is <strong>in</strong>dependent of the network<br />

size, and only computationally cheap operations, such as hash functions. The<br />

fact that nodes are with<strong>in</strong> one adm<strong>in</strong>istrative doma<strong>in</strong> means that <strong>for</strong> authentication,<br />

nodes have to simply prove that they belong to this doma<strong>in</strong>, which makes<br />

it possible to rely on a probabilistic authentication scheme. Pre-distribut<strong>in</strong>g<br />

key material be<strong>for</strong>e deployment is easily possible s<strong>in</strong>ce it is known <strong>in</strong> advance<br />

which nodes are go<strong>in</strong>g to be deployed together. Under the assumed node capture<br />

attack model, it has to be assumed that a certa<strong>in</strong> fraction of nodes is under<br />

control of the attacker. As a consequence, it has to be assumed that some of the<br />

reported data by sensor nodes is potentially manipulated, a fact that has to be<br />

dealt with on the application layer.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!