21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

150 Chapter 5. Multipath <strong>Communication</strong><br />

There are several other ways to <strong>in</strong>crease the delivery rate. One method is<br />

to switch the rout<strong>in</strong>g mode as soon as the message arrives at a node of the<br />

rout<strong>in</strong>g tree where neither the node’s cover area nor any of its children conta<strong>in</strong>s<br />

the message’s target location. Now, the subtree is chosen whose cover area is<br />

closest to the target location, and the message is routed to this subtree. This<br />

cont<strong>in</strong>ues until the message arrives at a leaf node, from which po<strong>in</strong>t on the<br />

message is routed, <strong>for</strong> example, us<strong>in</strong>g a geographical rout<strong>in</strong>g scheme. This<br />

procedure only kicks <strong>in</strong> when rout<strong>in</strong>g has gone wrong. The overhead of this<br />

method would be slightly more complex code <strong>in</strong> the nodes to implement the<br />

search <strong>for</strong> the closest cover area and geographical rout<strong>in</strong>g scheme over short<br />

distances. No additional messages are sent, but the delivery rate is <strong>in</strong>creased to<br />

100%.<br />

Another method to <strong>in</strong>crease the delivery rate is to pass a message always<br />

to all subtrees that presumably cover the target location. That way, the message<br />

will eventually reach a node that covers the target location. However, the<br />

message will also travel many more hops than are necessary, <strong>in</strong>creas<strong>in</strong>g the<br />

message overhead significantly at much simpler node logic.<br />

5.4 Security Evaluation<br />

5.4.1 Basic Security Model<br />

The security of a multi-path communication scheme is, first of all, provided<br />

by the fact that the attacker has to compromise multiple <strong>in</strong>termediate nodes <strong>in</strong><br />

order to break a s<strong>in</strong>gle communication relationship. If k (k ≥ 2) paths are used<br />

<strong>for</strong> transmitt<strong>in</strong>g a message, or authentication codes, compromis<strong>in</strong>g a number of<br />

paths smaller than k will at least lead to detection of the attack. Thus, if at least<br />

one path rema<strong>in</strong>s sound, the <strong>in</strong>tegrity of messages is ensured.<br />

We assume that the <strong>in</strong>dividual paths of a multi-path scheme use only l<strong>in</strong>k<br />

authentication. This means that a s<strong>in</strong>gle compromised node on such a path<br />

will compromise the complete path. It is, of course, possible to employ more<br />

advanced authentication schemes on <strong>in</strong>dividual paths. This possibility will be<br />

explored <strong>in</strong> the next chapter.<br />

For the basic determ<strong>in</strong>ation of the security of tree paths we consider a random<br />

spread attack. Us<strong>in</strong>g a l<strong>in</strong>k authentication scheme, a s<strong>in</strong>gle compromised<br />

node will break an <strong>in</strong>dividual path. Let x be the number of compromised nodes<br />

<strong>in</strong> the network, and N be the total number of nodes. For a tree path, this leads<br />

to the follow<strong>in</strong>g compromise probability: pc = 1 − (1 − x N )Lm. Us<strong>in</strong>g k paths <strong>in</strong><br />

a multi-path scheme, the <strong>in</strong>tegrity of a message is compromised if all paths are

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!