21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3<br />

A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong><br />

<strong>Networks</strong><br />

<strong>Wireless</strong> sensor networks <strong>in</strong>herit security vulnerabilities from three classes of<br />

computer systems: (1) As classical computers, they are vulnerable to malicious<br />

code such as viruses. (2) S<strong>in</strong>ce they use wireless communications, their<br />

communication l<strong>in</strong>ks are susceptible to eavesdropp<strong>in</strong>g, jamm<strong>in</strong>g, or message<br />

<strong>in</strong>jection attacks; they share this characteristic with mobile computers. (3) <strong>Sensor</strong><br />

networks often operate <strong>in</strong> unsupervised, open environments, where they can<br />

be physically accessed by potential adversaries; <strong>in</strong> this regard, they resemble<br />

embedded systems.<br />

In order to counter the threats stemm<strong>in</strong>g from these vulnerabilities, wellknown<br />

mechanisms can be employed, <strong>in</strong>clud<strong>in</strong>g code authentication, message<br />

encryption and authentication, and tamper proof<strong>in</strong>g (cf. [3]). However, the<br />

specific constra<strong>in</strong>ts of sensor networks may be prohibitive to lift<strong>in</strong>g them to a<br />

security level as high as traditional computer systems. Instead, we must explore<br />

solutions that exploit <strong>in</strong>herent characteristics of sensor networks, such as the<br />

large number of nodes, redundant deployment, and sensoric <strong>in</strong>put, to provide<br />

adequate security guarantees.<br />

In this chapter, we lay the foundations <strong>for</strong> such approaches by analyz<strong>in</strong>g the<br />

vulnerabilities of WSNs. We concentrate on a type of attack on wireless sensor<br />

networks, which is both specific to and relevant <strong>in</strong> this doma<strong>in</strong>. The security<br />

mechanisms presented <strong>in</strong> follow<strong>in</strong>g chapters will be especially effective with<br />

regard to this threat model. This model assumes an adversary who is able, at a<br />

certa<strong>in</strong> cost, to capture and take control of <strong>in</strong>dividual sensor nodes. This enables<br />

the adversary to exploit the capabilities of the captured nodes and participate<br />

<strong>in</strong> the operation of the sensor network. Depend<strong>in</strong>g on the objectives of the<br />

adversary, this may lead to data corruption, denial of service, or data disclosure,<br />

if no countermeasures are utilized.<br />

The strength of an attack is not only determ<strong>in</strong>ed by the number of cap-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!