21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.2. <strong>Sensor</strong> Node Characteristics 15<br />

much as possible [65]. This pr<strong>in</strong>ciple of localization should also be applied to<br />

security mechanisms. In consequence, this means that end-to-end security may<br />

be too expensive <strong>in</strong> many cases.<br />

For provid<strong>in</strong>g security services, we require that sensor nodes are able to<br />

execute basic cryptographic functions and store a moderate amount of key material.<br />

These requirements will be made more exact <strong>in</strong> the follow<strong>in</strong>g chapters.<br />

Most current sensor node prototypes fulfill these requirements. Some<br />

very small designs with similar computational power as RFID controllers, like<br />

Smart Dust [189], may not be able to comply with these requirements.<br />

Generally, <strong>in</strong>creas<strong>in</strong>g the avaialable resources on a sensor nodes helps the<br />

security of the node itself and the network as a whole. Some possible improvements<br />

are the follow<strong>in</strong>g:<br />

• By <strong>in</strong>creas<strong>in</strong>g the memory size, sensor nodes can store more key material.<br />

This saves bandwidth <strong>for</strong> key agreement or key transfer. More keys also<br />

result <strong>in</strong> a greater supported network size. Cost is <strong>in</strong>creased if key memory<br />

is located with<strong>in</strong> the tamper resistant module of the node, where space is<br />

expensive.<br />

• A higher processor speed decreases latency <strong>for</strong> cryptographic operations,<br />

which <strong>in</strong> turn allows larger keys and makes asymmetric cryptography<br />

more attractive.<br />

• A cryptographic coprocessor can be added. With hardware support, a<br />

speed-up of approximately 2 orders of magnitude can be achieved comput<strong>in</strong>g<br />

cryptographic functions (cf. Table 2.2 and Table 3.1). The coprocessor<br />

requires additional space with<strong>in</strong> the tamper resistant module.<br />

• By <strong>in</strong>creas<strong>in</strong>g the available amount of energy, more of it can be spent on<br />

security mechanisms, e.g. us<strong>in</strong>g larger key sizes lead<strong>in</strong>g to longer messages.<br />

2.2.2 Composition<br />

We assume a homogeneous network, i.e. all nodes possess equal capabilities.<br />

In particular, we do not assume that some nodes are better equipped than others<br />

(e.g. higher communication range), or that base stations exist. This allows large<br />

networks to be easily deployed, <strong>for</strong> example by dropp<strong>in</strong>g nodes out of a plane.<br />

It requires that the nodes organize themselves autonomously. As all nodes have<br />

equal capabilities, failed nodes can be substituted <strong>for</strong> by others.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!