21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

128 Chapter 4. Key Establishment<br />

The security of these key agreement schemes is based on the fact that no<br />

central entity with<strong>in</strong> the sensor network has complete knowledge of the basic<br />

key pool. With a small set of captured nodes, an attacker has only a very<br />

small probability of acquir<strong>in</strong>g knowledge about the key material of other nodes.<br />

However, with an <strong>in</strong>creas<strong>in</strong>g number of captured nodes, this probability rises<br />

and allows the attacker to leverage the key material from her captured nodes<br />

<strong>for</strong> break<strong>in</strong>g <strong>in</strong>to the communication of other nodes, i.e. eavesdrop on l<strong>in</strong>ks or<br />

impersonate nodes.<br />

We have discussed two basic key agreement schemes <strong>for</strong> wireless sensor<br />

networks. For the q-composite scheme, a set of keys is distributed to each<br />

node be<strong>for</strong>e deployment. S<strong>in</strong>ce all keys are drawn from a large, common pool<br />

of keys, it is likely that any pair of nodes has a certa<strong>in</strong> number of keys <strong>in</strong><br />

common. However, it is unlikely that any other pair of nodes shares the same<br />

keys. Whenever two nodes want to establish a common key, they can use their<br />

common keys to set up a l<strong>in</strong>k key, which is unique with a high probability.<br />

The second scheme is based on hash cha<strong>in</strong>s. A set of hash cha<strong>in</strong>s is created <strong>in</strong><br />

advance. Each node is assigned a position on each of these cha<strong>in</strong>s. The oneway<br />

property of hash functions makes it easy to compute the cha<strong>in</strong> values at<br />

positions <strong>in</strong> the cha<strong>in</strong> that are located below a given position. Out of this, a key<br />

agreement scheme can be constructed that provides comparable resilience as<br />

the q-composite scheme, though at a higher memory complexity. F<strong>in</strong>ally, we<br />

have devised a novel approach that comb<strong>in</strong>es both key agreement schemes and<br />

provides higher resilience than any one of them alone.<br />

Key agreement is a prerequisite <strong>for</strong> secure communication between nodes,<br />

both <strong>for</strong> ensur<strong>in</strong>g the confidentiality and the authenticity of messages. As we<br />

have discussed <strong>in</strong> Section 3.4, key agreement between remote nodes <strong>in</strong> a WSN<br />

<strong>in</strong>curs a significant overhead that is often not justified given the dom<strong>in</strong>ant transient<br />

communication patterns. There<strong>for</strong>e, our goal is to leverage the existence<br />

of shared keys on a local level, i.e. with<strong>in</strong> a limited neighbourhood of a node, <strong>in</strong><br />

order to enable secure communication between remote nodes without <strong>in</strong>curr<strong>in</strong>g<br />

the usual overhead. In the next chapter, we show how to achieve secure communication<br />

over long distances by <strong>in</strong>terleaved local message authentication. The<br />

basic scheme will be extended by us<strong>in</strong>g few long-range security relationships<br />

per node, which provides additional protection aga<strong>in</strong>st certa<strong>in</strong> attack patterns.<br />

The presented schemes protect the <strong>in</strong>tegrity of messages and thus are effective<br />

countermeasures aga<strong>in</strong>st manipulation attacks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!