21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.6. Compar<strong>in</strong>g Interleaved and Multipath Authentication 207<br />

Algorithm 7 is-path-compromised(p)<br />

Global values:<br />

A: the set of authentication l<strong>in</strong>ks (pairs of nodes)<br />

B: the set of compromised nodes<br />

Input:<br />

p: a communication path<br />

Output:<br />

Return true if p is compromised, false otherwise<br />

1: c[s] := WHITE <strong>for</strong> all s ∈ p ⊲ Initialize colors<br />

2: <strong>for</strong> i <strong>in</strong> {1,...,len(p)} do<br />

3: s := p[i]<br />

4: if s ∈ B then<br />

5: c[s] := RED ⊲ Compromised nodes are colored RED<br />

6: else<br />

7: if ∀ j < i.(p[ j],s) ∈ A ⇒ c[p[ j]] = RED then<br />

8: c[s] := RED ⊲ RED, if all <strong>in</strong>cident authentications from RED nodes<br />

9: end if<br />

10: end if<br />

11: end <strong>for</strong><br />

12: return c[p[len(p)]] = RED ⊲ Target node RED?<br />

compromised. With an <strong>in</strong>creas<strong>in</strong>g number of nodes be<strong>in</strong>g compromised, security<br />

deteriorates at a different rate <strong>for</strong> each attack type. For a large number<br />

of compromised nodes, the protection is highest aga<strong>in</strong>st a concentrated attack<br />

and lowest aga<strong>in</strong>st a random spread attack. For low numbers, the scheme holds<br />

up well aga<strong>in</strong>st all attack types, even the partition<strong>in</strong>g attack. Of course, this<br />

result confirms the assumption as this scheme was <strong>in</strong>tended to provide good<br />

protection aga<strong>in</strong>st the partition<strong>in</strong>g attack.<br />

6.6 Compar<strong>in</strong>g Interleaved and Multipath Authentication<br />

6.6.1 Multiple Physical vs. Virtual Paths<br />

There is an immediate similarity between <strong>in</strong>terleaved authentication and multiple<br />

path communication. Interleaved authentication creates multiple authentication<br />

paths on top of a physical communication path. In multi-path communication,<br />

multiple communication paths are explicitly used to transfer a message<br />

and associated authentication codes. Thus <strong>in</strong> both cases, multiple (disjo<strong>in</strong>t)<br />

paths are be<strong>in</strong>g used <strong>for</strong> transmitt<strong>in</strong>g authentication <strong>in</strong><strong>for</strong>mation. By <strong>in</strong>troduc<strong>in</strong>g<br />

redundancy, both schemes are able to tolerate a number of compromised<br />

nodes.<br />

While establish<strong>in</strong>g disjo<strong>in</strong>t paths <strong>in</strong> a multi-path scheme requires a trade-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!