21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

168 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

discussed later <strong>in</strong> this chapter, a f<strong>in</strong>ite value of δ can limit the impact of compromised<br />

nodes without los<strong>in</strong>g reachability.<br />

The rule direct-accept-and-<strong>for</strong>ward is applied when the current node does<br />

not qualify as a receiver of the message (s<strong>in</strong>ce it is too far away from the dest<strong>in</strong>ation),<br />

the dest<strong>in</strong>ation is with<strong>in</strong> a distance of δ, and Canvas authentication<br />

is successful. If these conditions are fulfilled, attestations are created and the<br />

message is <strong>for</strong>warded.<br />

The rule direct-accept-and-process on the other hand is applied when the<br />

current node qualifies as a receiver of the message and Canvas authentication<br />

succeeds. Here, the message is processed by the current node.<br />

6.2.3 Interaction with Rout<strong>in</strong>g <strong>Protocols</strong><br />

The purpose of a rout<strong>in</strong>g protocol is to <strong>for</strong>ward a message between hosts (nodes<br />

<strong>in</strong> the context of sensor networks) so it eventually arrives at its dest<strong>in</strong>ation. Two<br />

major issues <strong>in</strong> rout<strong>in</strong>g are address<strong>in</strong>g the dest<strong>in</strong>ation of a message, and path<br />

setup. Conventional rout<strong>in</strong>g protocols are often not suitable <strong>for</strong> sensor networks<br />

s<strong>in</strong>ce they fail to appropriately consider the limited resources of sensor nodes,<br />

the prevalent communication patterns, and the <strong>in</strong>herent redundancy <strong>in</strong> sensor<br />

networks. Here, we consider rout<strong>in</strong>g mechanisms that are well-suited <strong>for</strong> sensor<br />

networks, and exam<strong>in</strong>e how <strong>in</strong>terleaved authentication <strong>in</strong>teracts with them.<br />

Flood<strong>in</strong>g<br />

The simplest mode of propagat<strong>in</strong>g a message through a network is flood<strong>in</strong>g.<br />

While it guarantees that every relevant node receives the message, many redundant<br />

messages are transmitted. Due to its <strong>in</strong>efficiency, its applicability is<br />

rather limited. However, it deserves consideration as <strong>in</strong> some cases it is the<br />

only reliable way of distribut<strong>in</strong>g a message.<br />

In a simple flood<strong>in</strong>g protocol, each <strong>for</strong>ward<strong>in</strong>g node transmits a message<br />

to all of its neighbours (except the one from which the message has been received).<br />

A node needs only to be aware of its immediate neighbours. Us<strong>in</strong>g the<br />

Canvas scheme <strong>for</strong> message authentication, a <strong>for</strong>ward<strong>in</strong>g node has to transmit<br />

not only the message itself but also authentication codes <strong>for</strong> all the nodes on<br />

the next k levels of its <strong>for</strong>ward<strong>in</strong>g tree. Although it is possible to send all these<br />

codes to all neighbours, it is very <strong>in</strong>efficient, s<strong>in</strong>ce the nodes on deeper levels<br />

will not be able to make use of most of the authentication codes they receive.<br />

In order to reduce the overhead, it is reasonable <strong>for</strong> a <strong>for</strong>ward<strong>in</strong>g node to impose<br />

some structure, a “<strong>for</strong>ward<strong>in</strong>g tree”, on its k-neighbourhood, and use this<br />

structure to transmit only selected authentication codes to its neighbours.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!