21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Abstract<br />

<strong>Wireless</strong> sensor networks are comprised of large numbers of resource-constra<strong>in</strong>ed<br />

and wirelessly communicat<strong>in</strong>g comput<strong>in</strong>g devices. Advances <strong>in</strong> comput<strong>in</strong>g<br />

and communication technology have made it possible to <strong>in</strong>tegrate sens<strong>in</strong>g capabilities,<br />

wireless communication <strong>in</strong>terfaces, and microprocessors <strong>in</strong>to t<strong>in</strong>y devices<br />

that allow to embed compuational power <strong>in</strong> arbitrary environments. The<br />

applications of wireless sensor networks range from surveillance and environmental<br />

monitor<strong>in</strong>g to healthcare and the provision<strong>in</strong>g of context <strong>in</strong><strong>for</strong>mation<br />

<strong>for</strong> comput<strong>in</strong>g applications. Many of these applications have a direct impact<br />

on the welfare of human be<strong>in</strong>gs or are of high economic significance. Security<br />

breaches might lead to grave consequences, so it is important to protect<br />

wireless sensor networks aga<strong>in</strong>st such threats.<br />

The specific characteristics of wireless sensor networks make them vulnerable<br />

to attacks on their communication channels and their hardware. Cryptographic<br />

mechanisms can be employed to protect aga<strong>in</strong>st some of the possible<br />

attacks: eavesdropp<strong>in</strong>g on messages is countered by encryption, and the <strong>in</strong>jection<br />

of messages by the attacker is prevented by authentication. Un<strong>for</strong>tunately,<br />

direct physical access to the sensor nodes allows an attacker to manipulate them<br />

almost arbitrarily. In particular, nodes could be compromised and then made to<br />

execute malicious code <strong>in</strong>jected by the attacker. Tamper resistance mechanisms<br />

applied to the nodes’ hardware, concealment, surveillance and other techniques<br />

may be used to mitigate such attacks. However, they cannot be completely prevented<br />

and there<strong>for</strong>e, any communication security scheme be<strong>in</strong>g used must be<br />

sufficiently resilient to tolerate a certa<strong>in</strong> amount of compromised nodes. Consequently<br />

an important objective is to limit the impact of a set of compromised<br />

nodes on the legitimate operation of the network to a m<strong>in</strong>imum.<br />

This objective can optimally achieved by cryptographic mechanisms that establish<br />

a direct security relationship between communicat<strong>in</strong>g end-po<strong>in</strong>ts. This<br />

limits the <strong>in</strong>fluence that a s<strong>in</strong>gle compromised node has to its own resources.<br />

Thereby, it cannot tamper with messages that orig<strong>in</strong>ate at other nodes. However,<br />

such mechanisms are overly resource demand<strong>in</strong>g <strong>for</strong> many sensor nodes<br />

<strong>in</strong> terms of computational or communication complexity, especially due to the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!