21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1<br />

Introduction<br />

1.1 Background<br />

<strong>Wireless</strong> sensor networks are comprised of small, low-cost, resource-restricted<br />

devices that have the capability to communicate and <strong>in</strong>teract with their environment,<br />

either only passively by sens<strong>in</strong>g certa<strong>in</strong> parameters, or also actively by<br />

trigger<strong>in</strong>g actuators. The major limit<strong>in</strong>g factor <strong>in</strong> their design and operation is<br />

their restricted energy supply. Their computational capabilities are comparable<br />

to those found <strong>in</strong> embedded systems, as they are based on similar hardware designs.<br />

<strong>Sensor</strong> nodes employ wireless communication <strong>in</strong> order to exchange data<br />

with their peers. This is based mostly on radio communication, but there are<br />

some designs that employ alternatives, such as optical communication.<br />

Initially, sensor networks were conceived <strong>for</strong> military applications, <strong>for</strong> example<br />

to track mov<strong>in</strong>g objects <strong>in</strong> <strong>in</strong>accessible terra<strong>in</strong>. Due to their small size<br />

and low cost, they would allow <strong>for</strong> concealed deployment <strong>in</strong> large quantities.<br />

Recently they also have aroused <strong>in</strong>terest <strong>in</strong> civilian applications, <strong>for</strong> example<br />

as monitor<strong>in</strong>g tools <strong>in</strong> health applications, to collect environmental data, or to<br />

improve agriculture.<br />

In many application scenarios, security is a critical property of sensor networks,<br />

<strong>for</strong> example <strong>in</strong> the healthcare doma<strong>in</strong> where sensitive data is handled.<br />

Without adequate security, the acceptance of sensor networks as a tool will<br />

likely be limited. It is there<strong>for</strong>e important to understand what the risks are<br />

when operat<strong>in</strong>g a sensor network <strong>in</strong> a sensitive environment, and how these<br />

risks can be countered.<br />

<strong>Sensor</strong> networks are vulnerable aga<strong>in</strong>st attacks from the outside as they are<br />

us<strong>in</strong>g an openly accessible medium <strong>for</strong> communication. This allows an attacker<br />

to <strong>in</strong>tercept messages, or <strong>in</strong>terfere with transmissions, <strong>for</strong> example by jamm<strong>in</strong>g<br />

the radio channel or replay<strong>in</strong>g <strong>in</strong>tercepted messages. Insider attacks are possible<br />

if the attacker manages to <strong>in</strong>ject his own sensor nodes <strong>in</strong>to the network

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!