21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.4. Security Evaluation 183<br />

Number of functional paths<br />

1e+06<br />

900000<br />

800000<br />

700000<br />

600000<br />

500000<br />

400000<br />

300000<br />

200000<br />

100000<br />

0<br />

0 200 400 600 800 1000 0.001<br />

Number of compromised nodes<br />

CANVAS approximation<br />

CANVAS simulation<br />

Absolute error<br />

Relative error<br />

Figure 6.12: Precision of approximation compared to simulation, N = 1000<br />

by captur<strong>in</strong>g k + kd/2 nodes, where d is the average node degree. Assum<strong>in</strong>g<br />

the partition has two approximately equally sized parts, there are about N/2<br />

nodes <strong>in</strong> each of it. This leaves about 2 × N 2 /4 = N 2 /2 secure communication<br />

paths <strong>in</strong> total, i.e. half of the total number of communication paths. However,<br />

half of the secure paths are fully conta<strong>in</strong>ed <strong>in</strong> one block of the partition, and<br />

the other half <strong>in</strong> the other block. All paths between both blocks are compromised.<br />

If important messages flow from one block to the other, they are prone<br />

to manipulation.<br />

6.4.2 Numerical Approximation<br />

A node capture attack proceeds by successive compromise of nodes. Thus,<br />

the status of a node can either be non-compromised or compromised. A configuration<br />

def<strong>in</strong>es <strong>for</strong> each node its status. Thus, it is a mapp<strong>in</strong>g C : N →<br />

{legitimate,compromised}. For brevity, we write C(x) = {s ∈ N : C(s) = x},<br />

where x ∈ {legitimate,compromised}.<br />

An attack is a sequence of configurations C0,C1,...,Cn. The <strong>in</strong>itial configuration<br />

conta<strong>in</strong>s no compromised nodes, i.e. C0(compromised) = /0. All<br />

subsequent configurations build monotonously on the previous one, such that<br />

Ci(compromised) ⊂ Ci+1(compromised). The nodes whose status is newly set<br />

to compromised <strong>in</strong> each step are chosen accord<strong>in</strong>g to the different types of attacks,<br />

which are described <strong>in</strong> Section 3.3.6. For example, <strong>in</strong> a random spread<br />

100<br />

10<br />

1<br />

0.1<br />

0.01<br />

Relative error

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!