21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.7. Security Requirements 45<br />

access to an illegitimate user.<br />

A simpler approach to access control would be the use of a globally shared<br />

key <strong>for</strong> encrypt<strong>in</strong>g all traffic, which is regularly updated <strong>in</strong> order to provide<br />

backward secrecy. Such an approach is described <strong>in</strong> [13]. It protects aga<strong>in</strong>st<br />

eavesdropp<strong>in</strong>g by outsiders, but would not help <strong>in</strong> case there is at least one<br />

node be<strong>in</strong>g compromised by the adversary. The underly<strong>in</strong>g adversary model<br />

is fundamentally different from the one assumed <strong>in</strong> the previously described<br />

framework, but it is much easier to implement. Of course, there is no universal<br />

mechanism that can be applied efficiently <strong>in</strong> all cases. Eventually, the application<br />

scenario determ<strong>in</strong>es the appropriate mechanisms required <strong>for</strong> provid<strong>in</strong>g<br />

access control.<br />

2.7.4 Data Aggregation<br />

One of the ma<strong>in</strong> tasks of sensor networks is data aggregation, i.e. the comb<strong>in</strong>ation<br />

of data gathered by various sensors <strong>in</strong>to a s<strong>in</strong>gle value that is mean<strong>in</strong>gful<br />

with<strong>in</strong> the application context and represents the monitored state as accurately<br />

as possible. This process must not only be robust aga<strong>in</strong>st random errors, which<br />

are likely to occur, but also aga<strong>in</strong>st malicious nodes report<strong>in</strong>g <strong>in</strong>tentionally falsified<br />

sensor data.<br />

Generally, it is not feasible to detect whether a sensor reports the data it has<br />

obta<strong>in</strong>ed from its sensors correctly, as this would require a second sensor node<br />

that per<strong>for</strong>ms the same sensor read<strong>in</strong>gs. Due to the high redundancy <strong>in</strong> a sensor<br />

network, it would seem likely that <strong>in</strong> most cases, there would be sufficiently<br />

many nodes close to any other node. However, there are two reasons that argue<br />

aga<strong>in</strong>st such a solution. The first ist cost. Keep<strong>in</strong>g all nodes actively monitor<strong>in</strong>g<br />

their environment all the time depletes the energy sources of all these nodes. It<br />

would be more desirable to exploit the redundancy <strong>for</strong> extend<strong>in</strong>g the lifetime of<br />

the network, replac<strong>in</strong>g depleted nodes with others that have saved their energy.<br />

The second reason is that the adversary who has managed to compromise one<br />

node is likely to be able to compromise, or at least disable, the nearby nodes<br />

as well. These would then rather support the falsified read<strong>in</strong>gs of the first node<br />

than dispute them.<br />

If some correlation can be assumed between the sensor read<strong>in</strong>gs of nodes<br />

with<strong>in</strong> a certa<strong>in</strong> area that goes beyond the immediate reach of the adversary,<br />

nodes may still monitor each other’s read<strong>in</strong>gs and report gross aberrations. If<br />

a node constantly reports data that is <strong>in</strong>consistent with its neighbours’ read<strong>in</strong>gs,<br />

it might be expelled from the network. However, such a mechanism must<br />

be careful not to miss important events whose patterns may be misjudged as

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!