21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

214 Chapter 6. Integrity-Preserv<strong>in</strong>g <strong>Communication</strong>s<br />

DNS and store an additional record that provides, <strong>for</strong> each address doma<strong>in</strong>, the<br />

URL of a site that conta<strong>in</strong>s the message f<strong>in</strong>gerpr<strong>in</strong>ts. Thereby, doma<strong>in</strong> owners<br />

are free to adm<strong>in</strong>ister their own servers.<br />

6.8 Related Work<br />

To our knowledge, <strong>in</strong>terleaved authentication schemes have been <strong>in</strong>dependently<br />

conceived <strong>in</strong>dependently from our work [180, 181, 182] by several authors [71,<br />

206].<br />

The first record is by Goodrich [71], which has been extended later [72].<br />

In his scheme, <strong>for</strong> each node x, there is a key k(x) that is shared among all<br />

nodes <strong>in</strong> the neighbourhood of x, exclud<strong>in</strong>g x itself. A node adjacent to x uses<br />

k(x) to add an authentication code to a message be<strong>for</strong>e it sends it to x. When<br />

x passes the message (<strong>in</strong>clud<strong>in</strong>g the authentication code) on to another one of<br />

its neighbours, the receiver can verify that x has not modified the message.<br />

The difference to Canvas is the use of a s<strong>in</strong>gle key shared by all neighbours to<br />

protect aga<strong>in</strong>st the possible compromise of a node (x). In this approach, x can<br />

<strong>for</strong>ward a message accord<strong>in</strong>g to local requirements. It is not required that the<br />

sender of a message knows the path further down of x. Canvas requires this<br />

knowledge and thus implies additional communication. Goodrich applies the<br />

technique to secur<strong>in</strong>g the set-up of rout<strong>in</strong>g tables.<br />

The second <strong>in</strong>dependent record is by Zhu et al. [206], who proposed <strong>in</strong>terleaved<br />

authentication <strong>for</strong> <strong>in</strong>tegrity check<strong>in</strong>g of messages that are passed along<br />

a path from sensor nodes towards a base station. Similar to our work, they extended<br />

the scheme <strong>for</strong> <strong>in</strong>terleav<strong>in</strong>gs of more than two hops, which allows <strong>for</strong><br />

protection aga<strong>in</strong>st collud<strong>in</strong>g nodes on the path. Their ma<strong>in</strong> application of the<br />

technique is filter<strong>in</strong>g compromised messages be<strong>for</strong>e they actually reach a s<strong>in</strong>k.<br />

6.9 Summary<br />

In this chapter we have presented a family of protocols <strong>for</strong> communication <strong>in</strong>tegrity<br />

protection. The protocols are especially suitable <strong>for</strong> the use <strong>in</strong> wireless<br />

sensor networks as they do not rely on extensive end-to-end security relationships.<br />

Instead, local security relationships between k-hop neighbours (with a<br />

small k) and <strong>in</strong>terleav<strong>in</strong>gs of authentication paths provide a security level that<br />

approximates that of end-to-end security schemes. The security level can be<br />

further improved by <strong>in</strong>troduc<strong>in</strong>g a small number of long-range security relationships.<br />

We have shown the security per<strong>for</strong>mance of these protocols through

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!