21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.1. Authentication and Integrity Protection 159<br />

tication) are strongly related. We are go<strong>in</strong>g to discuss these issues <strong>in</strong> further<br />

detail <strong>in</strong> the follow<strong>in</strong>g section.<br />

In order to make message authentication possible, some identity must be attributed<br />

to the source of a message. Otherwise, it would not be mean<strong>in</strong>gful to<br />

claim that a message orig<strong>in</strong>ated from some specific entity. The message source<br />

has to be described <strong>in</strong> a unique way to assign an identity to it. Usually, this is<br />

achieved by giv<strong>in</strong>g all potential sources (nodes) names that are unique with<strong>in</strong><br />

the respective frame of reference. This makes it possible to issue a statement<br />

like “message M orig<strong>in</strong>ates from node p”, where M may be represented by a<br />

bitstr<strong>in</strong>g, and the name p by an <strong>in</strong>teger, <strong>for</strong> example. The purpose of authenticat<strong>in</strong>g<br />

message M is then to yield evidence about the validity of that statement.<br />

When the authentication of message M is successful, the association to its<br />

source p is established. At the same time, it is ensured that M has not been<br />

changed s<strong>in</strong>ce it was created by its source. Thus, authentication provides the<br />

authenticat<strong>in</strong>g party with two pieces of <strong>in</strong><strong>for</strong>mation about a message:<br />

1. A source is attributed to the message.<br />

2. The <strong>in</strong>tegrity of the message is ensured.<br />

In this regard, authenticity is a stronger property than <strong>in</strong>tegrity alone, s<strong>in</strong>ce it<br />

implies <strong>in</strong>tegrity and additionally l<strong>in</strong>ks an attribute (usually an identifier) of the<br />

source to a message. Vice versa, if the <strong>in</strong>tegrity of a message is violated, i.e.<br />

part of the message is altered or deleted, its authenticity (with regard to the<br />

statement above) is lost.<br />

Some considerations may illustrate this fact. If a message is altered (i.e. at<br />

least one bit changes) after the message has emerged from its source, a new<br />

message is <strong>in</strong> fact created. The orig<strong>in</strong>al message has served as <strong>in</strong>put <strong>for</strong> this<br />

trans<strong>for</strong>mation, and both messages may share large pieces of data. Still, two<br />

different messages now exist. And, unless the modification was done by the<br />

orig<strong>in</strong>al source, they have different sources. Thereby, an altered piece of data<br />

looses its authenticity.<br />

Differently stated: If it is possible to verify that a message orig<strong>in</strong>ates at the<br />

source that it is claimed to come from, this means that the message has not<br />

been changed s<strong>in</strong>ce the time it emerged from its source. Such a verification is<br />

usually based on a statement issued by the source itself, which acknowledges<br />

that the source has created the message. This statement applies to the message<br />

<strong>in</strong> its specific <strong>for</strong>m at creation time, and any change to the message <strong>in</strong>validates<br />

the statement.<br />

These considerations are <strong>in</strong>tended to illustrate that <strong>in</strong>tegrity can be achieved<br />

through authentication, and the violation of a message’s <strong>in</strong>tegrity makes it im-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!