21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.5. <strong>Sensor</strong> Network Models 31<br />

both cases devices are potentially exposed to attackers. Tamper resistance (or<br />

tamper evidence, if sufficient) is there<strong>for</strong>e a major requirement <strong>for</strong> their security<br />

[95, 151]. The research focus <strong>in</strong> sensor networks, <strong>in</strong>clud<strong>in</strong>g security mechanisms,<br />

is ma<strong>in</strong>ly governed by the assumption that resources are very tightly<br />

contra<strong>in</strong>ed and replenish<strong>in</strong>g the energy source is often not possible. In contrast,<br />

embedded computers are usually adapted to and <strong>in</strong>tegrated with their application<br />

environment, which is often of a technical nature where a power source<br />

is available and where regular ma<strong>in</strong>tenance is per<strong>for</strong>med. There<strong>for</strong>e, exist<strong>in</strong>g<br />

security mechanisms can often be adapted to the special requirements of embedded<br />

systems, while novel mechanisms are needed <strong>for</strong> sensor networks.<br />

2.5 <strong>Sensor</strong> Network Models<br />

2.5.1 The Geometric Model of <strong>Sensor</strong> <strong>Networks</strong><br />

It is common <strong>in</strong> the literature to represent the topology of a sensor network as<br />

a graph <strong>in</strong> the plane, where vertices represent sensor nodes, each at its dist<strong>in</strong>ct<br />

location, and an edge exists between two vertices if the respective nodes can<br />

communicate over a (wireless) l<strong>in</strong>k. For simplicity, it is often assumed that<br />

these l<strong>in</strong>ks are symmetric, and that the communication range is equal <strong>for</strong> all<br />

nodes. Usually, the deployment model <strong>for</strong> sensor networks is assumed to be<br />

random, i.e. nodes are randomly distributed on a plane with<strong>in</strong> a constra<strong>in</strong>ed<br />

area, e.g. a square or a circle. Most often, a uni<strong>for</strong>m random distribution is<br />

assumed. This distribution makes the least assumptions about the real-world<br />

deployment and thus one can hope that this model provides useful <strong>in</strong><strong>for</strong>mation<br />

about a large class of real-world networks. Although these assumptions are<br />

stretch<strong>in</strong>g the practical properties of sensor networks, they provide a useful<br />

abstraction <strong>for</strong> per<strong>for</strong>m<strong>in</strong>g calculations and simulations on such networks.<br />

For this random geometric graph model, there exists a large body of theoretical<br />

work, which is comprehensively presented by Penrose [140]. One of the<br />

most important aspects is the connectivity of such graphs. In a wireless network,<br />

it is desirable that all nodes are conta<strong>in</strong>ed <strong>in</strong> one large connected component<br />

of the network graph. This means that there exists a path between every<br />

pair of these nodes. Isolated nodes, or small connected components, are undesirable<br />

s<strong>in</strong>ce these nodes are not able to collaborate with other nodes, and it may<br />

not be possible <strong>for</strong> them to communicate with a base station. Bettstetter [18]<br />

evaluates the conditions under which a wireless network is connected with high<br />

probability. In particular, the required transmission range is derived <strong>for</strong> a given<br />

density (number of nodes per area unit), and, vice versa, if a transmission range

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!