21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.2. <strong>Sensor</strong> Node Characteristics 13<br />

Personal health data is of very sensitive nature, which most people would<br />

refuse to give away freely. It could be used to assess the lifestyle of a person or<br />

get h<strong>in</strong>ts on <strong>for</strong>mer and present diseases. Such data must there<strong>for</strong>e be protected<br />

aga<strong>in</strong>st unauthorized access.<br />

Military surveillance Military applications of wireless sensor networks <strong>in</strong>clude<br />

battlefield surveillance, where large numbers of nodes are deployed over territory<br />

through which enemy <strong>for</strong>ces may move, treaty monitor<strong>in</strong>g, and others<br />

[144]. The sensor network could autonomously differentiate between friendly<br />

and enemy vehicles, and report the number of vehicles detected as well as<br />

their speed and direction.<br />

Security <strong>in</strong> the military doma<strong>in</strong> is of paramount importance, s<strong>in</strong>ce accurate<br />

<strong>in</strong><strong>for</strong>mation is key to effective actions and <strong>for</strong> avoid<strong>in</strong>g own losses. If it were<br />

possible to manipulate the reports of a sensor network, <strong>for</strong>ces may be misguided<br />

and could give the enemy an advantage.<br />

Logistics <strong>Wireless</strong> sensor networks can be used <strong>in</strong> logistics, <strong>for</strong> example <strong>for</strong><br />

monitor<strong>in</strong>g the transport and storage conditions of goods. A prom<strong>in</strong>ent example<br />

is the cold cha<strong>in</strong> <strong>for</strong> food [153, 43]. Be<strong>in</strong>g able to acquire more accurate and<br />

more timely data may not only <strong>in</strong>crease consumer safety, but also reduce costs<br />

<strong>for</strong> product recalls.<br />

The highly fragmented, highly competitive markets <strong>in</strong> the food <strong>in</strong>dustry<br />

seem to encourage sloppy handl<strong>in</strong>g of products, and sometimes even crim<strong>in</strong>al<br />

actions take place. WSNs have the potential to deter such actions, if it can be<br />

ensured that the reported data is not falsified, which requires adequate security<br />

measures <strong>in</strong> all <strong>in</strong>volved <strong>in</strong><strong>for</strong>mation systems, <strong>in</strong>clud<strong>in</strong>g sensor networks.<br />

2.2 <strong>Sensor</strong> Node Characteristics<br />

In this thesis, we aim at provid<strong>in</strong>g security mechanisms <strong>for</strong> sensor networks that<br />

are applicable as widely as possible. We there<strong>for</strong>e make as few assumptions<br />

as possible about the supported types of networks. The security mechanisms<br />

should be effective even <strong>in</strong> the most basic configuration.<br />

Adopt<strong>in</strong>g the classification scheme of [157], our model can be characterized<br />

with the parameters shown <strong>in</strong> table 2.1. The unlisted categories (deployment,<br />

mobility, energy, modality, coverage, lifetime) have no direct impact on the security<br />

mechanisms that are proposed later, although they could be relevant with<br />

regard to other security mechanisms. The listed parameters are understood as

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!