21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.4. Security Evaluation 193<br />

The secret suffix construction has the disadvantage that if the underly<strong>in</strong>g<br />

hash function h is not resistant to f<strong>in</strong>d<strong>in</strong>g second preimages, a MAC can be<br />

easily constructed <strong>for</strong> <strong>for</strong>ged messages. This is particularly undesirable s<strong>in</strong>ce<br />

the attack can be executed offl<strong>in</strong>e, i.e. no <strong>in</strong>teraction with the receiv<strong>in</strong>g node<br />

is necessary. The orig<strong>in</strong>al message m is known, so the attacker can use this<br />

knowledge to search <strong>for</strong> a message m ′ that yields the same hash output as m.<br />

The attacker can then transmit m ′ and the orig<strong>in</strong>al MAC a. The verification<br />

done by the receiver will be successful.<br />

It is not known whether modern cryptographic hash functions, such as the<br />

family of SHA functions, is <strong>in</strong>deed resistant to second preimage attacks. Weaknesses<br />

are cont<strong>in</strong>ously show<strong>in</strong>g up but it hasn’t been demonstrated yet that arbitrary<br />

second preimages can be easily found. SHA-1 has been found to be weak<br />

aga<strong>in</strong>st collision attacks [188], mean<strong>in</strong>g that pairs of messages m1 and m2 can<br />

be found that yield the same hash value. However, this does not immediately<br />

lead to a vulnerability regard<strong>in</strong>g second preimages, which requires to f<strong>in</strong>d a<br />

second message that yields the same hash value as a given message. Thus, we<br />

can safely use SHA-1 as an example hash function. However, any other hash<br />

function can be used <strong>in</strong> the Canvas scheme as well.<br />

It is important to note that public key signature schemes are vulnerable to<br />

the same preimage attack as the secret suffix MAC if the signature is created on<br />

the hashed message. Only if the signature is created on the message directly,<br />

this attack does not apply. However, this is only possible if the message is short<br />

enough. Thus <strong>in</strong> general, hash-based signatures are applied. To conclude, the<br />

secret suffix method will yield a similar security level as a public key signature<br />

scheme.<br />

6.4.6 Example: A Dynamic Application Scenario<br />

Figure 6.19 shows the layout of a build<strong>in</strong>g with a number of rooms and a hall<br />

connect<strong>in</strong>g these rooms. A possible application of a wireless sensor network<br />

<strong>in</strong> such a scenario is the report<strong>in</strong>g of sensor data to a guard walk<strong>in</strong>g through<br />

the hall. <strong>Sensor</strong> nodes are distributed throughout the area. The sensor data is<br />

reported to the node that is closest to the guard. It is assumed that the guard<br />

walks straight through the hall and collects data at regular <strong>in</strong>tervals, twenty<br />

times <strong>in</strong> total. Each time, a randomly selected node from each room sends a<br />

message towards the location of the guard.<br />

Figure 6.20 shows the number of non-tampered messages that are obta<strong>in</strong>ed<br />

by the guard while the network is under a random spread attack. With a small<br />

number of compromised nodes (up to 50, <strong>in</strong> this case), more than 80% of the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!