21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

208 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

Psi<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

Resilience of Interleaved Authentication<br />

0<br />

0 100 200 300 400 500<br />

Compromised nodes<br />

Random spread, hop-to-hop<br />

Random spread, Canvas<br />

Random spread, Interleaved<br />

Hitpo<strong>in</strong>ts, Interleaved<br />

Concentrated, Interleaved<br />

Partition, Interleaved<br />

Figure 6.24: Resilience of <strong>in</strong>terleaved authentication under various attacks<br />

off between set-up complexity and path length, multiple “virtual” paths on the<br />

same physical path are established <strong>in</strong> the <strong>in</strong>terleaved authentication scheme<br />

that are disjo<strong>in</strong>t by construction. These virtual paths are guaranteed to exist,<br />

and they are easily constructed. In addition, only one physical path is <strong>in</strong>volved<br />

and the virtual paths are not longer than the physical path.<br />

6.6.2 Comb<strong>in</strong><strong>in</strong>g Authentication Techniques<br />

While we have considered authentication based on multiple physical and virtual<br />

paths separately, both techniques can be comb<strong>in</strong>ed. Each tree path itself may<br />

use another layer of authentication, <strong>for</strong> example Canvas authentication. In that<br />

way, the advantages of both, multi-path rout<strong>in</strong>g and Canvas authentication, are<br />

comb<strong>in</strong>ed, cf. Fig. 6.25. Table 6.6 shows that this comb<strong>in</strong>ation gives a slight<br />

advantage over each of the schemes alone.<br />

6.7 Applications<br />

A fundamental idea underly<strong>in</strong>g <strong>in</strong>terleaved authentication is security through<br />

collaboration: Two (or more) <strong>in</strong>dependent entities provide <strong>in</strong><strong>for</strong>mation about<br />

the authenticity of a message, thereby re<strong>in</strong><strong>for</strong>c<strong>in</strong>g the confidence of the receiver<br />

that the message is <strong>in</strong>deed correctly transmitted. We give some examples where<br />

this pr<strong>in</strong>ciple is applied.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!