21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

158 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

Def<strong>in</strong>ition 6.2. Key authentication is the property whereby one party is assured<br />

that no other party aside from a specifically identified second party (and possibly<br />

additional identified trusted parties) may ga<strong>in</strong> access to a particular secret<br />

key.<br />

Def<strong>in</strong>ition 6.3. Data orig<strong>in</strong> authentication is a type of authentication whereby<br />

a party is corroborated as the (orig<strong>in</strong>al) source of specified data created at some<br />

(typically unspecified) time <strong>in</strong> the past.<br />

Def<strong>in</strong>ition 6.4. Data <strong>in</strong>tegrity is the property whereby data has not been altered<br />

<strong>in</strong> an unauthorized manner s<strong>in</strong>ce the time it was created, transmitted, or stored<br />

by an authorized source.<br />

In the course of this work, we most often refer to “messages” <strong>in</strong>stead of<br />

“data”. As a message, we understand a conta<strong>in</strong>er <strong>for</strong> data, which is represented<br />

<strong>in</strong> some encoded <strong>for</strong>m. However, <strong>in</strong> many cases these terms are used <strong>in</strong>terchangeably.<br />

Also, we talk about “hosts” or “nodes” <strong>in</strong>stead of “parties”, but<br />

these terms are used <strong>in</strong>terchangeably.<br />

There are a variety of methods <strong>for</strong> entity and message authentication be<strong>in</strong>g<br />

used. In the physical world, biometric techniques are used <strong>for</strong> authenticat<strong>in</strong>g<br />

human be<strong>in</strong>gs: F<strong>in</strong>gerpr<strong>in</strong>ts may be used <strong>for</strong> entity authentication, while voice<br />

recognition is commonly used <strong>for</strong> entity and message authentication (over the<br />

phone, <strong>for</strong> exmple). In electronic communication systems, cryptographic, keybased<br />

methods are required. Standard mechanisms <strong>for</strong> authentication <strong>in</strong>clude<br />

digital signatures and message authentication codes (cf. 2.8.2).<br />

Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g data <strong>in</strong>tegrity is often achieved through mechanisms like redundant<br />

storage or checksums. This is sufficient to counter unsystematic errors<br />

which occur <strong>in</strong> natural phenomena like fatigue of material or random <strong>in</strong>terference.<br />

In cases where data <strong>in</strong>tegrity is threatened by a skillful, malicious adversary,<br />

this is not sufficient. In such a case, data orig<strong>in</strong> authentication through<br />

cryptographic means is used to detect unauthorized tamper<strong>in</strong>g with data. There<br />

is no known cryptographic primitive, which can be used to ensure <strong>in</strong>tegrity<br />

(aga<strong>in</strong>st malicious adversaries) without recourse to authentication.<br />

It has to be stressed that node authentication alone does not guarantee correctness.<br />

A compromised node may correctly report its identity and authenticate<br />

its message as it is expected from a correctly operat<strong>in</strong>g node. However, the<br />

data it reports may be manipulated, and there may be no way of detect<strong>in</strong>g such<br />

manipulations. This is the reason why node capture attacks are so powerful.<br />

The last two def<strong>in</strong>itions will be the most important ones <strong>for</strong> this work, and<br />

both data <strong>in</strong>tegrity and data orig<strong>in</strong> authentication (also called message authen-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!