21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

40 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

assumed to be superior. This allows it to evaluate the security of an entity (or a<br />

set of communicat<strong>in</strong>g entities) fac<strong>in</strong>g a powerful attacker. If no vulnerabilities<br />

can be found dur<strong>in</strong>g a test of an entity, or even a proof of their absence can be<br />

found, this provides strong evidence of the entitiy’s security.<br />

2.6.3 Network-based Simulation<br />

A network-based simulation is completely <strong>in</strong>dependent from implementation<br />

details. Nodes are modelled declaratively, i.e. their behaviour is described as<br />

a relationship between <strong>in</strong>com<strong>in</strong>g and outgo<strong>in</strong>g messages. Messages are never<br />

lost and are delivered <strong>in</strong>stantly. The only characteristic of the communication<br />

medium that is carried over to the model is the limited range of a wireless connection,<br />

which determ<strong>in</strong>es the connectivity graph. Fluctuations <strong>in</strong> connectivity<br />

are disregarded, though. These simplifications lead to a static graph model of<br />

the sensor network, where the vertices represent the nodes, and the edges of the<br />

graph mirror the communication l<strong>in</strong>ks between neighbour<strong>in</strong>g nodes.<br />

A simulation based on this model is executed as a message exchange between<br />

nodes. Some nodes create messages “spontaneously”, mean<strong>in</strong>g we silently<br />

assume that there is a good reason <strong>for</strong> some node to create a message. This<br />

very reason is unimportant <strong>for</strong> our results. A message is transmitted over the<br />

(wireless) communication medium. In most cases, we can assume a broadcast<br />

medium, such as electro-magnetic waves. But a directed medium is possible,<br />

such as light. A node that receives a message will either consume the message<br />

or trans<strong>for</strong>m it and then relay it to other nodes. The exact operation depends on<br />

the current state of the node. Possible states are, abstractly, correct, malicious,<br />

failed. The fundamental attacker model <strong>in</strong>cludes the attacker’s capability to<br />

take full control over all nodes where the attack succeeds (this is what is accomplished<br />

by a “root kit” <strong>for</strong> computers connected to the Internet). Alternatives<br />

are possible, <strong>for</strong> example partial control over a node. Depend<strong>in</strong>g on its state,<br />

a receiv<strong>in</strong>g node trans<strong>for</strong>ms the message and relays it further to one or more<br />

of its own neighbours. This process cont<strong>in</strong>ues until some node consumes the<br />

message without relay<strong>in</strong>g it. The state of a node <strong>in</strong>fluences the trans<strong>for</strong>mation<br />

of messages that are go<strong>in</strong>g through a node. In our case, the state ma<strong>in</strong>ly reflects<br />

whether a node is controlled by the adversary or not. The state rema<strong>in</strong>s fixed<br />

dur<strong>in</strong>g a simulation run.<br />

The major advantage of network-based simulations over node-level simulations<br />

is scalability. Network-based simulations allow the simulation of much<br />

larger sets of nodes, s<strong>in</strong>ce most node-<strong>in</strong>ternal details are disregarded. Thus,<br />

the state <strong>in</strong><strong>for</strong>mation be<strong>in</strong>g kept <strong>for</strong> each node is m<strong>in</strong>imal. Also, possible <strong>in</strong>-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!