21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.3. Per<strong>for</strong>mance Evaluation 175<br />

A<br />

B<br />

C<br />

D<br />

Figure 6.6: Aggregation tree<br />

nodes C, D, and E, and <strong>for</strong>wards it to A. Usually, the message from B to A only<br />

conta<strong>in</strong>s the aggregated data calculated by B, based on the <strong>in</strong>put from B, C, D,<br />

and E. This leaves A with the only choice of trust<strong>in</strong>g that B sends correct data.<br />

However, from time to time, A checks whether the calculation done by B is<br />

correct. For do<strong>in</strong>g so, it requests the follow<strong>in</strong>g additional data:<br />

• The orig<strong>in</strong>al <strong>in</strong>puts from B, C, D, and E.<br />

• Authentication codes from C, D, and E <strong>for</strong> their orig<strong>in</strong>al <strong>in</strong>puts to B. S<strong>in</strong>ce<br />

these nodes are 2-hop neighbours of A, creat<strong>in</strong>g such authentication codes<br />

is possible.<br />

This data allows A to check whether the calculation of B is correct by per<strong>for</strong>m<strong>in</strong>g<br />

the same calculation itself. If the result differs from what B has sent, this<br />

should be <strong>in</strong>terpreted as a sign <strong>for</strong> a potential ongo<strong>in</strong>g attack. Additionally, B<br />

may be considered <strong>for</strong> exclusion from further operation <strong>in</strong> the network, and the<br />

aggregation tree rebuilt.<br />

The times when A per<strong>for</strong>ms such checks must be chosen randomly to avoid<br />

that B be<strong>in</strong>g able to predict them, which would obviously allow B to render<br />

these checks <strong>in</strong>effective. Also, the additional data that is required <strong>for</strong> check<strong>in</strong>g<br />

amounts to a significant transmission load, so the check should only be<br />

done rarely. This constitutes, of course, a trade-off between efficiency and the<br />

likelihood of catch<strong>in</strong>g a malicious node.<br />

6.3 Per<strong>for</strong>mance Evaluation<br />

The evaluation of Canvas is based on a comparison with a generic end-to-end<br />

signature scheme. We compare the <strong>in</strong>crease <strong>in</strong> time to delivery, which is due<br />

to additional, e.g. cryptographic, operations, and the transmission delay <strong>for</strong><br />

additional data. We first look at the overhead <strong>for</strong> a s<strong>in</strong>gle message. Then, we<br />

consider the overhead <strong>for</strong> a sequence of messages, e.g. a sensor data stream.<br />

E

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!