21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66 Chapter 3. A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

tured nodes, but also by the attacker’s ability to <strong>in</strong>terfere with the operations of<br />

uncompromised nodes. Such <strong>in</strong>terference may comprise the manipulation of<br />

sensor read<strong>in</strong>gs, which <strong>in</strong> most cases requires physical access to the nodes or<br />

the ability to change their environment, which may <strong>in</strong>volve the use of powerful<br />

equipment. Usually it is easier to tamper with the operations of uncompromised<br />

nodes from with<strong>in</strong> the network. S<strong>in</strong>ce sensor nodes act as message <strong>for</strong>warders<br />

on behalf of other nodes, it is easy <strong>for</strong> them to drop messages or manipulate<br />

their contents. Thus, the selection of compromised nodes will be important <strong>for</strong><br />

determ<strong>in</strong><strong>in</strong>g the strength of an attack as some nodes are more valuable to an<br />

attacker than others.<br />

The best known protection aga<strong>in</strong>st attacks on communications are end-toend<br />

security associations such as shared keys or those provided by a public<br />

key <strong>in</strong>frastructure. However, such associations can be prohibitively costly <strong>in</strong><br />

wireless sensor networks. There<strong>for</strong>e, we explore alternative approaches that<br />

provide approximations to end-to-end security while still achiev<strong>in</strong>g an adequate<br />

level of protection.<br />

3.1 Attack Paths<br />

Today’s research prototypes of sensor nodes employ virtually no protection<br />

mechanisms at all. Re-programm<strong>in</strong>g is easily possible with little technical requirements<br />

[15]. This is, of course, due to the early technical stage of development,<br />

and the research focus on functional and operational aspects of sensor<br />

network<strong>in</strong>g. Also, the real-world deployment of sensor networks is <strong>in</strong> its <strong>in</strong>fancy,<br />

so the demand <strong>for</strong> secure sensor devices has not yet emerged. Should the<br />

demand arise, it is probably possible to develop devices with a certa<strong>in</strong> level of<br />

hardware protection, profit<strong>in</strong>g from experience <strong>in</strong> other areas. With appropriate<br />

f<strong>in</strong>ancial <strong>in</strong>vestment, it seems perfectly feasible to build sensor devices that<br />

are physically isolated from their environment except <strong>for</strong> dedicated communication<br />

<strong>in</strong>terfaces. These <strong>in</strong>terfaces rema<strong>in</strong> to be secured through cryptographic<br />

means and secure protocol eng<strong>in</strong>eer<strong>in</strong>g.<br />

There are three levels on which vulnerabilities may exist despite of careful<br />

design and eng<strong>in</strong>eer<strong>in</strong>g. The first is the physical level, i.e. vulnerabilities of the<br />

hardware. These are hard to protect aga<strong>in</strong>st, s<strong>in</strong>ce sensor networks are often deployed<br />

<strong>in</strong> open environments, and reliable physical protection is expensive. The<br />

second level is comprised of the <strong>in</strong>terfaces that are offered by a sensor node.<br />

Some <strong>in</strong>terfaces are <strong>in</strong>dispensable, s<strong>in</strong>ce communication with other nodes is required,<br />

and connections to sensors have to exist. The third level is the software<br />

runn<strong>in</strong>g on sensor nodes. <strong>Secure</strong> software eng<strong>in</strong>eer<strong>in</strong>g is a quickly develop<strong>in</strong>g

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!