21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.9. Exist<strong>in</strong>g Approaches to <strong>Wireless</strong> <strong>Sensor</strong> Network Security 59<br />

A more flexible technique has been proposed first by Eschenauer and<br />

Gligor [64]. It is based on random key predistribution and provides stochastic<br />

security aga<strong>in</strong>st node capture attacks, i.e. if only a small number of nodes<br />

are captured, there is a high probability that a key exchanged between two<br />

nodes rema<strong>in</strong>s secret. There have been several extensions and improvements<br />

proposed to that basic technique [39, 143, 204, 38].<br />

The earlier proposals <strong>for</strong> group key management by Blom [24] and Blundo<br />

et al. [25] were the foundation <strong>for</strong> other key agreement schemes [117, 60, 161].<br />

These exhibit a threshold property: unless a certa<strong>in</strong> number of nodes have been<br />

captured, all pairwise keys rema<strong>in</strong> secure with high probability; if the threshold<br />

is exceeded, all pairwise keys are almost immediately compromised.<br />

Other variations are based on comb<strong>in</strong>atorial designs [110] (where the assignment<br />

of keys is determ<strong>in</strong>istic, but the resilience aga<strong>in</strong>st capture is nevertheless<br />

stochastic), or assume a slightly different attacker model [5]. In the latter case,<br />

it is assumed that the attacker can monitor only a small fraction of message<br />

exchanges dur<strong>in</strong>g an <strong>in</strong>itial time frame after deployment. It is shown that although<br />

keys are transmitted <strong>in</strong> clear text dur<strong>in</strong>g that phase, only a small fraction<br />

of keys is actually compromised.<br />

2.9.2 <strong>Secure</strong> <strong>Communication</strong><br />

Key agreement as described <strong>in</strong> the previous subsection is a prerequisite <strong>for</strong><br />

general secure node-to-node communication, either on the l<strong>in</strong>k level between<br />

neighbour<strong>in</strong>g nodes, or between remote nodes that are separated by multiple<br />

hops. For more constra<strong>in</strong>ed communication patterns, more economical techniques<br />

are conceivable.<br />

One of the most light-weight protocols is µTESLA [142]. It is <strong>in</strong>tended to<br />

be used <strong>in</strong> base station-centric networks, where the most prevalent communication<br />

patterns are po<strong>in</strong>t-to-po<strong>in</strong>t between a base station and a node (e.g. <strong>for</strong><br />

queries and report<strong>in</strong>g sensor read<strong>in</strong>gs), and broadcasts from the base station<br />

to all nodes (e.g. <strong>for</strong> queries or reprogramm<strong>in</strong>g the entire network). It only<br />

assumes that every node shares a unique key with the base station (<strong>for</strong> po<strong>in</strong>tto-po<strong>in</strong>t<br />

messages between the base station and the node). Us<strong>in</strong>g this key, the<br />

broadcast authentication mechanism can be bootstrapped.<br />

This broadcast authentication mechanism is based on hash cha<strong>in</strong>s and loose<br />

time synchronization. For bootstrapp<strong>in</strong>g the mechanism, the base station sends<br />

an authenticated (us<strong>in</strong>g the pairwise key) element of the hash cha<strong>in</strong> to a node,<br />

together with tim<strong>in</strong>g <strong>in</strong><strong>for</strong>mation. The hash cha<strong>in</strong> element is a symmetric key<br />

that is valid only dur<strong>in</strong>g a certa<strong>in</strong> period <strong>in</strong> time. Dur<strong>in</strong>g this period, it is used

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!