21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.3. Related Network Types 21<br />

zero, cost. This gives rise to an adversary model that determ<strong>in</strong>es the strength<br />

of the adversary based on the number of compromised nodes.<br />

2.2.8 Further Assumptions<br />

Mobility<br />

We make no assumptions about the mobility of sensor nodes. Geographic rout<strong>in</strong>g<br />

is largely <strong>in</strong>variant to mobility as long as the mobility rate does not affect<br />

local message <strong>for</strong>ward<strong>in</strong>g (which is the case as long as transmitt<strong>in</strong>g a message<br />

is much faster than the movement of nodes, which we can safely assume <strong>for</strong><br />

radio communication). The schemes of chapter 4 provide the means <strong>for</strong> key<br />

agreement between neighbour<strong>in</strong>g nodes. A high mobility rate could impose a<br />

significant overhead as the neighbourhood of a node frequently changes. However,<br />

this does not affect the security of key agreement or the proposed security<br />

schemes. A high mobility rate can be compensated <strong>for</strong> by mak<strong>in</strong>g all negotiations<br />

between nodes reactive, i.e. they occur only when a higher-layer protocol<br />

requires it. This avoids unnecessary message exchanges but is likely to <strong>in</strong>crease<br />

response times.<br />

Evolv<strong>in</strong>g Hard- and Software<br />

Currently, sensor nodes are be<strong>in</strong>g built mostly as prototypes <strong>in</strong> small quantities<br />

that are used <strong>in</strong> education and prototypical deployments <strong>in</strong> research projects.<br />

There are several l<strong>in</strong>es along which the technology is be<strong>in</strong>g improved, such as<br />

component <strong>in</strong>tegration <strong>for</strong> optimiz<strong>in</strong>g size, or provision of an endur<strong>in</strong>g power<br />

source. The software layer is be<strong>in</strong>g developed mostly us<strong>in</strong>g plat<strong>for</strong>ms such as<br />

the BTnode [20]. The physical size of such plat<strong>for</strong>ms is largely dom<strong>in</strong>ated by<br />

the batteries be<strong>in</strong>g used. For deployments <strong>in</strong> real-world environments, usually<br />

a special cas<strong>in</strong>g is required to protect the sensor nodes aga<strong>in</strong>st external <strong>for</strong>ces.<br />

A size shr<strong>in</strong>k can be expected <strong>in</strong> the future due to two l<strong>in</strong>es of progress: batteries<br />

with <strong>in</strong>creased lifetime at lower size, and decreased energy consumption<br />

by electronic components, protocols, and software that makes more efficient<br />

use of the available power source.<br />

2.3 Related Network Types<br />

M<strong>in</strong>iaturization <strong>in</strong> electronics components has made the commoditization of<br />

digital wireless communication possible. This allowed not only the proliferation<br />

of mobile phone networks, which rely on a fixed <strong>in</strong>frastructure, but also

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!