21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

176 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

6.3.1 S<strong>in</strong>gle Message Overhead<br />

For each message be<strong>in</strong>g transmitted from the source to a target node, the Canvas<br />

scheme requires that each node on the path checks k authentication codes<br />

(MAC) and generates another k MACs addressed to nodes further down the<br />

path. Nodes close to the source will check fewer MACs, while nodes close to<br />

the target will generate fewer of them. In general, on each l<strong>in</strong>k, T = k(k +1)/2<br />

MACs are transmitted. For l<strong>in</strong>ks that are close to the source or the s<strong>in</strong>k, some<br />

of these MACs are “miss<strong>in</strong>g”, and we can adjust the number of MACs be<strong>in</strong>g<br />

transmitted by:<br />

(k − d)(k − d + 1)<br />

δ(d) = ,d < k<br />

2<br />

where d is the distance of the l<strong>in</strong>k from the source/target, start<strong>in</strong>g with d = 1<br />

<strong>for</strong> l<strong>in</strong>ks that are adjacent to the source/target. For each l<strong>in</strong>k with d < k, T is<br />

reduced by δ(d) <strong>in</strong> order to determ<strong>in</strong>e the number of transmitted MACs.<br />

At each node, check<strong>in</strong>g and generat<strong>in</strong>g the MACs consumes time, which<br />

delays the relay<strong>in</strong>g of the message. If the HMAC construction is used, the<br />

complete message has to be processed separately <strong>for</strong> each MAC be<strong>in</strong>g verified<br />

or generated. From a per<strong>for</strong>mance po<strong>in</strong>t of view, the secret suffix construction<br />

is there<strong>for</strong>e preferred as it requires the message to be hashed only once. The<br />

hash value generated is then used <strong>for</strong> MAC verification and generation.<br />

When a digital signature scheme is be<strong>in</strong>g used, the follow<strong>in</strong>g <strong>in</strong><strong>for</strong>mation<br />

has to be transmitted <strong>in</strong> order to authenticate a message: the public key of<br />

the source node, a certificate stat<strong>in</strong>g that the public key is authorized, and a<br />

signature of the message. For each pair of communicat<strong>in</strong>g nodes, the public key<br />

and the certificate have to be exchanged only once. The encod<strong>in</strong>g <strong>for</strong>mat <strong>for</strong><br />

keys, signatures, and certificates may <strong>in</strong>duce additional overhead. For example,<br />

a certificate <strong>for</strong>mat such as X.509 [81] conta<strong>in</strong>s <strong>in</strong><strong>for</strong>mation about the validity<br />

of the certificate and other facts that need not to be explicitly represented <strong>in</strong> the<br />

context of wireless sensor networks. There<strong>for</strong>e, we can restrict ourselves here<br />

to the m<strong>in</strong>imum amount of data required. An ECDSA signature is a pair (r,s).<br />

The size of both r and s is governed by the parameter n, which should be at<br />

least 160 bits large accord<strong>in</strong>g to [88]. Thus the size of a signature is at least<br />

320 bits. The public key is the result of a multiplication of the private key with<br />

a po<strong>in</strong>t. Us<strong>in</strong>g a standardized elliptic curve with key length 192 bits, this yields<br />

a public key size of around 600 bits.<br />

The ef<strong>for</strong>t of generat<strong>in</strong>g and verify<strong>in</strong>g the signature is only <strong>in</strong>duced at the<br />

source and the target nodes. Intermediate nodes on the path do not have to per<strong>for</strong>m<br />

any computation but need to simply relay the message. Thus, no further<br />

delay is <strong>in</strong>troduced by this scheme.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!