21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

60 Chapter 2. <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong> and Their Security<br />

to authenticate messages from the base station, but it rema<strong>in</strong>s unknown to the<br />

receiv<strong>in</strong>g nodes. This means that nodes must buffer these messages first. Only<br />

after a certa<strong>in</strong> delay after the end of its validity period, it is disclosed by openly<br />

broadcast<strong>in</strong>g it. At that moment, nodes can (1) verify the authenticity of the<br />

key (by comput<strong>in</strong>g the accord<strong>in</strong>g step <strong>in</strong> the hash cha<strong>in</strong>) and (2) authenticate<br />

the messages that have been sent by the base station.<br />

The deferred disclosure is necessary <strong>in</strong> order to avoid abuse of the key by<br />

malicious nodes or an external attacker. If the key would be disclosed be<strong>for</strong>e<br />

the validity period ends, it could be used by an attacker to <strong>in</strong>ject authenticated<br />

messages.<br />

The key is disclosed only after the end of its validity period, plus the disclosure<br />

delay. This is required <strong>in</strong> order to compensate <strong>for</strong> slight misalignments <strong>in</strong><br />

the nodes’ clocks. Thus, tight time synchronization between all nodes and the<br />

base station is not required.<br />

µTESLA is extremely efficient to implement, as it requires each node to<br />

store only two keys, and the only cryptographic operation is the computation<br />

of hash functions (message authentication is based on the same hash function).<br />

The overhead per message is caused by the message authentication code, which<br />

is 8 byte us<strong>in</strong>g RC5 as the hash function, which was used <strong>in</strong> [142]. The key<br />

disclosure messages <strong>in</strong>cur little overhead s<strong>in</strong>ce they can be piggy-backed on<br />

other messages from the base station. Only if no other traffic is generated,<br />

extra messages <strong>for</strong> key disclosure have to be sent.<br />

The reverse communication pattern to broadcast is aggregation. Here, data<br />

collected by sensor nodes is transmitted towards the base station (or another<br />

data s<strong>in</strong>k). The <strong>in</strong>dividual data packets are not simply concatenated and passed<br />

on by <strong>in</strong>termediary nodes, but rather the data is comb<strong>in</strong>ed and compacted. This<br />

m<strong>in</strong>imizes the size of transmitted data but preserves its usefulness <strong>for</strong> the application.<br />

For example, the average, m<strong>in</strong>imum, and maximum temperature <strong>in</strong> a<br />

room could be determ<strong>in</strong>ed <strong>in</strong> this way without hav<strong>in</strong>g to preserve every s<strong>in</strong>gle<br />

data item.<br />

The threat to data aggregation is that malicious nodes could falsify the aggregation<br />

result by either <strong>in</strong>ject<strong>in</strong>g false sensor data of their own, or by pass<strong>in</strong>g<br />

on falsified aggregation <strong>in</strong><strong>for</strong>mation. This cannot be completely prevented, as<br />

false sensor data may be <strong>in</strong>dist<strong>in</strong>guishable to a faulty sensor. Also, as sensor<br />

data from different sources is <strong>in</strong>tegrated, authentication <strong>in</strong><strong>for</strong>mation of <strong>in</strong>dividual<br />

data packets is lost.<br />

The work described <strong>in</strong> [146] and [186] approaches this problem from a statistical<br />

perspective. The objective is to reduce the possible error <strong>in</strong>troduced by<br />

malicious nodes below a certa<strong>in</strong> threshold. Data aggregation is also discussed

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!