21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.2. Basic Interleaved Authentication 167<br />

Algorithm 5 canvas-auth(A,P,m,C)<br />

Global values:<br />

X: ID of current node<br />

k: Parameter of the Canvas schme<br />

Input:<br />

A: message source<br />

P: dest<strong>in</strong>ation location<br />

m: message text<br />

C: authentication <strong>in</strong><strong>for</strong>mation<br />

Output:<br />

Return modified authentication <strong>in</strong><strong>for</strong>mation<br />

1: C ′ := C \ {(_,X,_,_) ∈ C} ⊲ Remove all MACs <strong>for</strong> X<br />

2: <strong>for</strong> i <strong>in</strong> {1...k} do<br />

3: V := prefetch-hop(i)<br />

4: cXV := cXV + 1<br />

5: a := {A,P,m,cXV }KXV<br />

6: C ′ := C ′ ∪ {(X,V,cXV ,a)}<br />

7: end <strong>for</strong><br />

8: return C ′<br />

The fundamental message acceptance rules <strong>for</strong> the Canvas authentication<br />

scheme are shown <strong>in</strong> Table 6.1. Messages are marked with flags that denote<br />

their type. Here, only type DIRECT is used, which <strong>in</strong>dicates that the authentication<br />

of the message is completely handled locally, i.e. at each hop. Later, we<br />

will see another type, SHORTCUT, which extends the authentication of messages<br />

to larger distances. The <strong>for</strong>mat of messages is expla<strong>in</strong>ed <strong>in</strong> Table 6.2.<br />

The dest<strong>in</strong>ation location of a message is specified by geographic coord<strong>in</strong>ates.<br />

Table 6.3 lists the rema<strong>in</strong><strong>in</strong>g parameters that are be<strong>in</strong>g used <strong>in</strong> rules. The<br />

distance function d yields the geographic distance between a node and a location.<br />

τ is a global parameter that determ<strong>in</strong>es the acceptable deviation from<br />

the exact dest<strong>in</strong>ation location. If a node is located with<strong>in</strong> a range of τ from a<br />

dest<strong>in</strong>ation location, this node is qualified to be the f<strong>in</strong>al receiver of a message.<br />

This means that this node will not further relay the message. It could, however,<br />

<strong>in</strong><strong>for</strong>m the nodes <strong>in</strong> its vic<strong>in</strong>ity that it has received the message. There could be<br />

multiple nodes that are qualified to receive a message <strong>for</strong> a certa<strong>in</strong> dest<strong>in</strong>ation,<br />

and multiple messages addressed to the same dest<strong>in</strong>ation could be received by<br />

different nodes. It is up to a higher system layer, such as a cluster<strong>in</strong>g protocol<br />

or the application itself, to coord<strong>in</strong>ate the activities of all these nodes.<br />

Another global parameter denot<strong>in</strong>g a geographic distance is δ. This parameter<br />

denotes the maximum distance over which Canvas-authenticated messages<br />

should be <strong>for</strong>warded. If δ = ∞, there is no limit on that distance, and full<br />

reachability is ma<strong>in</strong>ta<strong>in</strong>ed. For variations of the basic authentication scheme

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!