21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

172 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

codes is straight<strong>for</strong>ward. A node receiv<strong>in</strong>g a message also receives authentication<br />

codes <strong>for</strong> the next (k − 1) hops, so the follow<strong>in</strong>g hops on the path are<br />

already determ<strong>in</strong>ed. The current node there<strong>for</strong>e has to select only the kth hop<br />

follow<strong>in</strong>g the current node on the path. An authentication code <strong>for</strong> that node is<br />

added to the message be<strong>for</strong>e it is <strong>for</strong>warded along the path. Thereby, event and<br />

query messages are be<strong>in</strong>g Canvas-authenticated. Establish<strong>in</strong>g a random path<br />

us<strong>in</strong>g Canvas requires a “lookahead” of k hops <strong>in</strong>stead of one. As the paths<br />

are set up randomly <strong>in</strong> any case, there is no fundamental difference. Thus, the<br />

functionality of such paths is not affected by choos<strong>in</strong>g randomly the kth-next<br />

hop <strong>in</strong>stead of the immediate next hop.<br />

A second, query-driven, approach to content-based rout<strong>in</strong>g is to set up gradients<br />

from a message source to <strong>in</strong>terested receivers, called “directed diffusion”<br />

[86]. First, the query is flooded. When it reaches a match<strong>in</strong>g source, the<br />

source sets up gradients to those neighbours from which the query has been<br />

received. These nodes do the same until a path from the source to the s<strong>in</strong>k is<br />

established. Gradients are used <strong>for</strong> select<strong>in</strong>g the optimal path, and <strong>for</strong> repair<strong>in</strong>g<br />

broken paths.<br />

Canvas authentication <strong>for</strong> flooded queries can be per<strong>for</strong>med as described <strong>in</strong><br />

the previous paragraph. The prospective message source receives possibly multiple<br />

copies of the request and sets up gradients <strong>in</strong> the opposite direction. Note<br />

that a message carries the node identifiers of the last k hops <strong>in</strong> the authentication<br />

records. The source stores the last k hops <strong>for</strong> every gradient. This allows it<br />

to do k-Canvas authentication <strong>for</strong> the event messages as they are be<strong>in</strong>g sent to<br />

<strong>in</strong>terested nodes.<br />

Note that Canvas authentication alone does not make these protocols “secure”<br />

per se. It may still be possible <strong>for</strong> an adversary to attack these protocols<br />

on a different level than message authentication. For example, the event paths<br />

set up <strong>for</strong> rumor rout<strong>in</strong>g may be misdirected <strong>in</strong> such a way as to m<strong>in</strong>imize the<br />

chance of them hitt<strong>in</strong>g query messages. Or, a node may set up bogus gradients,<br />

thereby clutter<strong>in</strong>g up the memory of other nodes. Message authentication alone<br />

cannot prevent such attacks.<br />

Geographic Rout<strong>in</strong>g<br />

Geographic rout<strong>in</strong>g [91, 100] uses location <strong>in</strong><strong>for</strong>mation <strong>for</strong> address<strong>in</strong>g nodes<br />

<strong>in</strong>stead of identifiers. It is assumed that all nodes know their locations, and<br />

the locations of the nodes <strong>in</strong> their immediate neighbourhood. It is straight<strong>for</strong>ward<br />

to extend this knowledge to the k-hop neighbourhood, which is required<br />

<strong>for</strong> Canvas authentication. Rout<strong>in</strong>g proceeds <strong>in</strong> two modes: greedy and face

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!