21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

48 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

detected by neighbour<strong>in</strong>g nodes.<br />

Legitimate nodes should cooperate <strong>in</strong> identify<strong>in</strong>g and classify<strong>in</strong>g abnormal<br />

behaviour of their fellow nodes. However, the attacker may not change the<br />

behaviour of the nodes significantly <strong>in</strong> the beg<strong>in</strong>n<strong>in</strong>g, such that neighbour<strong>in</strong>g<br />

nodes cannot detect the <strong>in</strong>trusion by simply observ<strong>in</strong>g the compromised nodes.<br />

This gives the adversary time <strong>for</strong> compromis<strong>in</strong>g even more nodes and then<br />

start a large-scale attack <strong>in</strong>volv<strong>in</strong>g many nodes distributed over a large area at<br />

the same time.<br />

In order to detect such <strong>in</strong>trusions, an active approach is needed such as described<br />

<strong>in</strong> [174, 183]. Chang<strong>in</strong>g the behaviour of a sensor node requires chang<strong>in</strong>g<br />

its program code. As there is only limited memory on a sensor node it is<br />

likely that <strong>in</strong> order to apply the changes, the old (legitimate) code has to be<br />

erased. Neighbour<strong>in</strong>g nodes can detect these changes by putt<strong>in</strong>g out randomized<br />

challenges that require the challenged node to prove that it possesses the<br />

current legitimate program code. If a node fails to prove it, it could be expelled<br />

from the network, or its program code can be updated by its neighbours. Such<br />

an update mechanism requires that the bootloader part of the sensor node is<br />

kept <strong>in</strong> a tamper-proof module.<br />

There are similarities between sensor networks and ad hoc networks that are<br />

relevant to <strong>in</strong>trusion detection techniques [202]. One such similarity is the lack<br />

of a communication <strong>in</strong>frastructure. As there are no central routers, each node<br />

has to rely on its own audit traces (the network traffic it has monitored over<br />

time) <strong>in</strong> order to make decisions about possible <strong>in</strong>trusions. These traces are<br />

limited to the vic<strong>in</strong>ity of a node and there<strong>for</strong>e provide only partial <strong>in</strong><strong>for</strong>mation.<br />

The limited storage capacity restricts the amount of potential evidence that can<br />

be stored, and the computational power avaialable <strong>for</strong> evaluat<strong>in</strong>g this data is<br />

limited. On the other hand, <strong>in</strong>trusion detection seems to be easier <strong>in</strong> sensor<br />

networks as the behaviour of nodes is much more restricted and homogeneous<br />

than <strong>in</strong> general ad hoc networks.<br />

2.7.7 Intrusion Tolerance<br />

One problem with <strong>in</strong>trusion detection is that the adversary may be able to adapt<br />

the behaviour of compromised nodes <strong>in</strong> such a way that their aberrant behaviour<br />

is not classified as such. Thus, these nodes operate seem<strong>in</strong>gly normally and are<br />

able to <strong>in</strong>fluence the overall operation of the network.<br />

In order to <strong>in</strong>troduce some level of <strong>in</strong>trusion tolerance, it is advisable not to<br />

rely on the reports from a s<strong>in</strong>gle node but <strong>in</strong>stead require some agreement by a<br />

number of nodes be<strong>for</strong>e a report is accepted and further processed. A number

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!