21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.6. Simulation of <strong>Sensor</strong> <strong>Networks</strong> 39<br />

class) host, which makes it easy to reconfigure the nodes and run a wide range<br />

of tests <strong>in</strong> a completely automated manner with m<strong>in</strong>imal ef<strong>for</strong>t.<br />

An important component <strong>in</strong> a sensor network is the wireless communication<br />

medium be<strong>in</strong>g used. The per<strong>for</strong>mance and energy demands of a protocol<br />

directly depend on the characteristics of the medium and the communication<br />

<strong>in</strong>terface. It is there<strong>for</strong>e important to be able to test new protocol designs and<br />

evaluate their costs be<strong>for</strong>e they are deployed on actual hardware plat<strong>for</strong>ms.<br />

Consequently, there exist sophisticated models of this low level layer that <strong>in</strong>clude<br />

characteristics such as radio propagation and <strong>in</strong>terference. The goal is to<br />

reflect the properties of the real communication medium as closely as possible.<br />

For example, simulation environments like OMNeT++ [120], TOSSIM [115],<br />

or ns2 [130] allow <strong>for</strong> the specification of a model of the wireless channel.<br />

Some predef<strong>in</strong>ed specifications are already provided <strong>in</strong> most packages, which<br />

can be further ref<strong>in</strong>ed as required. However, all of these models provide only an<br />

imperfect embodiment of reality, so <strong>in</strong> most works, the results obta<strong>in</strong>ed through<br />

simulation are validated by tests on real hardware, usually on a smaller scale<br />

than the simulation.<br />

Node-level simulations encompass<strong>in</strong>g the network stack are useful <strong>for</strong> evaluat<strong>in</strong>g<br />

the per<strong>for</strong>mance and energy characteristics of an implementation. They<br />

can also be helpful <strong>for</strong> test<strong>in</strong>g whether potential security-relevant flaws exist<br />

<strong>in</strong> an implementation. Standard security evaluation techniques like penetration<br />

test<strong>in</strong>g [7] and fuzz<strong>in</strong>g [131] are usually applied to real-world implementations.<br />

However, they can also be helpful <strong>in</strong> uncover<strong>in</strong>g vulnerabilities <strong>in</strong> the design<br />

of network protocols or system designs when they are applied to <strong>for</strong>mal system<br />

models [168] or dur<strong>in</strong>g simulations. In these cases, it is important that<br />

all relevant properties of all components of a network node are reflected <strong>in</strong> the<br />

underly<strong>in</strong>g abstract model.<br />

Security evaluations <strong>in</strong> this fashion study the security properties of s<strong>in</strong>gle<br />

nodes. They assume an external attacker, i.e. some entity that is able to send<br />

messages through the communication channel. In reality, this could be some<br />

exist<strong>in</strong>g node that is compromised by the attacker, or some additional device<br />

through which the attacker is able to simulate a legitimate party. Depend<strong>in</strong>g<br />

on its actual manifestation, the attacker may have certa<strong>in</strong> abilities that exceed<br />

those of the legitimate participants, such as excessive computational or transmission<br />

power. Usually, the attacker model proposed by Dolev and Yao [57] is<br />

assumed. This model represents an external attacker that has full access to the<br />

communication channel be<strong>in</strong>g used by legitimate participants. This means that<br />

the attacker can read all exchanged messages and <strong>in</strong>ject own messages, as well<br />

as <strong>in</strong>tercept messages and drop them. The attacker’s computational abilities are

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!