21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

Multipath <strong>Communication</strong><br />

The use of multiple paths <strong>for</strong> transmitt<strong>in</strong>g a s<strong>in</strong>gle message or a stream of messages<br />

has been studied <strong>for</strong> a long time. Multiple paths potentially provide <strong>in</strong>creased<br />

bandwidth, improved resilience aga<strong>in</strong>st network failures, and security<br />

aga<strong>in</strong>st tamper<strong>in</strong>g and eavesdropp<strong>in</strong>g. However, they require additional ef<strong>for</strong>t<br />

<strong>in</strong> order to actually achieve these goals. In most cases, either node- or l<strong>in</strong>kdisjo<strong>in</strong>tness<br />

is required. For example, bandwidth can only be <strong>in</strong>creased if no<br />

low-bandwidth l<strong>in</strong>ks are shared between the used paths. Ensur<strong>in</strong>g such a property<br />

<strong>in</strong>creases the complexity and the overhead <strong>for</strong> a multipath rout<strong>in</strong>g protocol.<br />

This may be the reason that <strong>in</strong> practice, multipath rout<strong>in</strong>g is seldomly used.<br />

In this chapter, we propose a multipath communication scheme <strong>for</strong> wireless<br />

sensor networks that provides security aga<strong>in</strong>st node capture attacks. The<br />

scheme is designed to m<strong>in</strong>imize path selection complexity, and it achieves its<br />

security goals through the spatial separation of paths.<br />

5.1 Pr<strong>in</strong>ciples of Multipath <strong>Communication</strong><br />

5.1.1 S<strong>in</strong>gle vs. Multiple Paths<br />

Some network topologies, such as stars or trees, admit only a s<strong>in</strong>gle path between<br />

any two nodes. In such networks, multipath communication is obviously<br />

not possible. But even a simple topology like a (bidirectional) r<strong>in</strong>g provides<br />

more than one path, and <strong>in</strong> complex mesh topologies, many paths between any<br />

pair of nodes may exist. In practice, redundant l<strong>in</strong>ks are often <strong>in</strong>troduced <strong>in</strong><br />

order to provide resilience aga<strong>in</strong>st l<strong>in</strong>k failures.<br />

F<strong>in</strong>d<strong>in</strong>g the “optimal” path from a sender to a receiver is one of the common<br />

tasks of rout<strong>in</strong>g protocols. Usually a path is selected that per<strong>for</strong>ms best accord<strong>in</strong>g<br />

to some cost metric, such as transmission delay or energy consumption.<br />

This s<strong>in</strong>gle best path can then be used to transmit all messages from sender to<br />

receiver until an event occurs that breaks the path, such as a node or l<strong>in</strong>k fail-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!