21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

44 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

verification, and broadcast authentication, which are able to protect aga<strong>in</strong>st<br />

most attacks. S<strong>in</strong>khole and wormhole attacks are hard to defend aga<strong>in</strong>st. A<br />

s<strong>in</strong>khole attracts messages and prevents them from reach<strong>in</strong>g their target. A<br />

wormhole is a shortcut through the network (an external low-latency l<strong>in</strong>k) that<br />

can be used to mount s<strong>in</strong>khole, selective <strong>for</strong>ward<strong>in</strong>g, or eavesdropp<strong>in</strong>g attacks.<br />

Data-centric rout<strong>in</strong>g protocols are vulnerable aga<strong>in</strong>st these attacks s<strong>in</strong>ce a path<br />

is established between the source and the receiver of a message. By offer<strong>in</strong>g superior<br />

rout<strong>in</strong>g properties (low latency, high energy resources), a node under the<br />

adversary’s control can <strong>in</strong>fluence the establishment of these paths. Geographic<br />

rout<strong>in</strong>g protocols are less vulnerable to these attacks. For example, a wormhole<br />

could deliver a message to its <strong>in</strong>tended target prematurely, which is hardly a<br />

violation of security. Assum<strong>in</strong>g that the target address is <strong>in</strong>cluded <strong>in</strong> a message<br />

and cannot be changed by the attacker, a node that receives that message<br />

through a wormhole but is not located at the target address itself would simply<br />

<strong>for</strong>ward the message towards its actual target location. This changes the path<br />

the message travels, which may or may not be a security violation depend<strong>in</strong>g<br />

on the application context.<br />

2.7.3 Access Control<br />

Many sensor network applications deal with sensitive or commercially valuable<br />

data; queries are dissem<strong>in</strong>ated through the network, trigger<strong>in</strong>g nodes to activate<br />

their sensors and transmit data; actuators are triggered by control commands.<br />

All these actions are significant with regards to the (commercial) operation of<br />

the sensor network, and its <strong>in</strong>teraction with its environment. Illegitimate use<br />

may have harmful consequences. There<strong>for</strong>e, access to a sensor network should<br />

be restricted to authorized parties.<br />

Access control plays an important role <strong>in</strong> ensur<strong>in</strong>g the confidentiality and<br />

<strong>in</strong>tegrity of sensor network data, as well as the safe operation of a sensor network.<br />

Thus, an effective access control mechanism is required, preferably implemented<br />

<strong>in</strong> a distributed manner <strong>in</strong> order to allow arbitrary entry po<strong>in</strong>ts <strong>in</strong>to<br />

the network. This avoids the use of a centralized entitiy that acts as a s<strong>in</strong>gle<br />

entry po<strong>in</strong>t, thereby constitut<strong>in</strong>g a s<strong>in</strong>gle po<strong>in</strong>t of failure, and a per<strong>for</strong>mance<br />

bottleneck.<br />

The access control mechanism should still be effective when the network is<br />

be<strong>in</strong>g attacked and some nodes have been compromised. Such a robust framework<br />

<strong>for</strong> access control <strong>in</strong> sensor networks is described <strong>in</strong> [17], where a certa<strong>in</strong><br />

m<strong>in</strong>imum number of nodes have to agree <strong>in</strong> order to authenticate a pr<strong>in</strong>cipal<br />

request<strong>in</strong>g access. This avoids that a s<strong>in</strong>gle, compromised node is able to grant

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!