21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.2. Basic Interleaved Authentication 171<br />

Authentication code overhead<br />

1e+06<br />

100000<br />

10000<br />

Flood<br />

Tree<br />

1000<br />

6 8 10 12 14 16 18 20 22 24 26 28<br />

Average neighbourhood size<br />

Figure 6.5: Total Canvas message overhead when us<strong>in</strong>g broadcast-based flood<strong>in</strong>g vs. flood<strong>in</strong>g<br />

over a tree structure. The difference amounts to an order of magnitude<br />

Content-Based Rout<strong>in</strong>g<br />

The ma<strong>in</strong> idea of content-based rout<strong>in</strong>g is to <strong>for</strong>ward a message only to those<br />

nodes, which have stated an <strong>in</strong>terest that matches the type of content the message<br />

carries [35]. This k<strong>in</strong>d of data dissem<strong>in</strong>ation is especially suited <strong>for</strong> environments<br />

<strong>in</strong> which the sources and receivers of messages frequently change,<br />

and where there is no need <strong>for</strong> a mutual relationship between a source and the<br />

receivers. A good metaphor of this k<strong>in</strong>d of data dissem<strong>in</strong>ation is the spread<strong>in</strong>g<br />

of rumors: The exact source of a rumor is often unknown, and everybody can<br />

either act on the message the rumor conveys, tell it to others, or simply ignore it.<br />

This simplicity is advantageous <strong>in</strong> large-scale sensor networks. Consequently,<br />

a protocol <strong>for</strong> content-based data dissem<strong>in</strong>ation <strong>in</strong> sensor networks has been<br />

proposed that builds on this idea [31]. The ma<strong>in</strong> idea of “rumor rout<strong>in</strong>g” is<br />

that a message source distributes an event notification over a limited number of<br />

(random) paths. Any node <strong>in</strong>terested <strong>in</strong> a certa<strong>in</strong> k<strong>in</strong>d of events releases a query<br />

that is <strong>for</strong>warded along a (also random) path through the network. As soon as<br />

the query hits a node that is part of a match<strong>in</strong>g event path, which happens with<br />

high probability, a path between source and s<strong>in</strong>k can be established.<br />

Rumor rout<strong>in</strong>g builds event and query paths randomly, i.e. at each hop, the<br />

next hop is determ<strong>in</strong>ed by randomly select<strong>in</strong>g a node from the set of neighbours.<br />

The extension to a k-neighbourhood and add<strong>in</strong>g Canvas authentication

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!