21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

50 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

of nodes and eventually <strong>in</strong> the <strong>in</strong>operability of the overall network. Such disturbances<br />

may not be easily identified as malicious <strong>in</strong>terferences, and there<strong>for</strong>e<br />

no effective countermeasures exist. An attentive observer may notice a higher<br />

failure rate than expected, but still the cause may rema<strong>in</strong> obscure.<br />

While battery exhaustion attacks are effective, see [170], they require some<br />

sophistication on behalf of the adversary and are time-consum<strong>in</strong>g. For example,<br />

the attacker has to match the activity cycle of the victim device. For an<br />

immediate effect, more radical approaches are required, such as the physical<br />

destruction of nodes or jamm<strong>in</strong>g the communication channels. However, most<br />

of these attacks can be easily detected by those nodes be<strong>in</strong>g unaffected.<br />

For example, if the attacker is jamm<strong>in</strong>g a region of the network, nodes with<strong>in</strong><br />

this region cannot receive messages anymore. However, they will notice that<br />

they are be<strong>in</strong>g jammed and may be able to issue messages report<strong>in</strong>g the attack.<br />

Nodes at the border of the jammed region pick these messages up. They can<br />

then further report the attack to the operator, and they can set up paths <strong>for</strong><br />

rout<strong>in</strong>g messages around the jammed region such that the operation of the rest<br />

of the network is not affected. If jammed nodes are not able to send anyth<strong>in</strong>g,<br />

the nodes at the border will have to assume that some of their neighbours have<br />

failed. A geographic rout<strong>in</strong>g mechanism will then automatically start to route<br />

messages around that dead area [201, 198].<br />

Jamm<strong>in</strong>g and physical destruction of nodes are simple <strong>for</strong>ms of denial-ofservice<br />

attacks that can be compensated <strong>for</strong> if they appear only on a small scale,<br />

i.e. if only a small area is affected. Sometimes, the effects of a denial-of-service<br />

attack can be mitigated if nodes are able to extend their sleep cycle when they<br />

notice that an attack is go<strong>in</strong>g on, such that they conserve as much power as<br />

possible. This would make the sensor network <strong>in</strong>operable dur<strong>in</strong>g the attack,<br />

but at least it can cont<strong>in</strong>ue operation once the attack has ceased. Of course, if<br />

an exhaustion attack is successfully executed on a large scale, affect<strong>in</strong>g large<br />

areas, there is no possiblity to recover other than by deploy<strong>in</strong>g new nodes after<br />

destruction.<br />

2.8 Cryptography <strong>for</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

Cryptography plays an important role <strong>in</strong> secur<strong>in</strong>g networked computer systems.<br />

It provides the basic functionality <strong>for</strong> protect<strong>in</strong>g the confidentiality, <strong>in</strong>tegrity,<br />

and authenticity of messages and data. Here, we present the cryptographic<br />

build<strong>in</strong>g blocks that will be important <strong>in</strong> later chapters. Their ma<strong>in</strong> applications<br />

will be key agreement and message authentication. We <strong>in</strong>clude a separate<br />

section where general issues <strong>in</strong> key management are discussed, which will not

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!