21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.2. Rout<strong>in</strong>g on Spann<strong>in</strong>g Trees 133<br />

R1<br />

B<br />

R2<br />

Figure 5.1: Spann<strong>in</strong>g tree multiple path rout<strong>in</strong>g<br />

structures. Each spann<strong>in</strong>g tree determ<strong>in</strong>es a path between any two nodes, and<br />

multiple such paths are used <strong>for</strong> message exchange. We show that, similar<br />

to Canvas, this scheme provides an adequate level of <strong>in</strong>tegrity protection <strong>for</strong><br />

wireless sensor networks.<br />

The fundamental idea of this approach is to set up multiple spann<strong>in</strong>g trees<br />

and use them to create paths between pairs of nodes, which are node-disjo<strong>in</strong>t to<br />

a certa<strong>in</strong> extent. An example is shown <strong>in</strong> Figure 5.1. Three spann<strong>in</strong>g trees with<br />

roots at R1,R2,R3 determ<strong>in</strong>e three paths between A and B.<br />

Obviously, pairs of paths are not necessarily node-disjo<strong>in</strong>t. In the example,<br />

only pairs AR1B,AR2B and AR1B,AR3,B are node-disjo<strong>in</strong>t, while AR2B,AR3B<br />

overlap. Despite the overlap, path AR3B does not degrade the security of the<br />

set-up but adds to it. The overlap occurs close to B, so the pr<strong>in</strong>ciple of locality<br />

applies: In order to exploit the overlap, the attacker must be active <strong>in</strong> the vic<strong>in</strong>ity<br />

of B. If the attacker is only active further away from B, three locations have<br />

to be attacked <strong>in</strong> order to compromise a message exchange. This significantly<br />

<strong>in</strong>creases the burden on the attacker.<br />

Sett<strong>in</strong>g up a spann<strong>in</strong>g tree is a costly procedure, as all nodes are <strong>in</strong>volved.<br />

A<br />

R3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!