21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

68 Chapter 3. A Security Model <strong>for</strong> <strong>Wireless</strong> <strong>Sensor</strong> <strong>Networks</strong><br />

(ISDN, ADSL). <strong>Wireless</strong> connections usually yield between 128 kbit/s<br />

(ZigBee) and 54 Mbit/s (IEEE 802.11g). An attack occurr<strong>in</strong>g with<strong>in</strong> a<br />

LAN yields up to 1 Gbit/s. Direct wired <strong>in</strong>terfaces allow similar data rates,<br />

<strong>for</strong> example Firewire (the IEEE 1394b standard yields up to 800Mbit/s) or<br />

serial ATA (300 Mbyte/s = 2.4 Gbit/s).<br />

• Sensitive <strong>in</strong><strong>for</strong>mation, which would not be accessible otherwise, can be<br />

acquired through special equipment that is secretly attached to a computer,<br />

e.g. a key logger <strong>for</strong> record<strong>in</strong>g passwords.<br />

• Physical evidence can be collected dur<strong>in</strong>g an attack, which is not possible<br />

with remote attacks. Physical evidence could support non-repudiable attribution<br />

of data to a person or organization, thereby facilitat<strong>in</strong>g extortion.<br />

Examples of such evidence <strong>in</strong>clude hard disks, possibly with f<strong>in</strong>gerpr<strong>in</strong>ts<br />

on them, or pr<strong>in</strong>touts (that can be attributed to a certa<strong>in</strong> pr<strong>in</strong>ter).<br />

On the other hand, physical attacks are usually riskier than remote attacks,<br />

s<strong>in</strong>ce the attacker himself enters the doma<strong>in</strong> of his opponent. Some risks are:<br />

• Leav<strong>in</strong>g traces that could lead to the identification of the attacker.<br />

• Physical ef<strong>for</strong>t is required to break <strong>in</strong>to the area where the computers are<br />

kept (e.g. a server room), which is susceptible to detection my surveillance<br />

mechanisms.<br />

Physically attack<strong>in</strong>g a sensor network avoids most of the risks usually associated<br />

with physical attacks. <strong>Sensor</strong> nodes are usually placed outside the close<br />

doma<strong>in</strong> of their owners, <strong>for</strong> example <strong>in</strong> public spaces. Surveillance systems<br />

may be hard to operate <strong>in</strong> such areas. Once the attacker has physical access<br />

to the sensor nodes, it is easy <strong>for</strong> him to extract <strong>in</strong><strong>for</strong>mation from them if no<br />

further precautions are taken.<br />

One possible measure is tamper-proof<strong>in</strong>g. Here, sensor nodes are shielded<br />

by a barrier that is hard to penetrate and thereby prevents direct access to memory<br />

or the CPU. Similarly to smart cards or trusted plat<strong>for</strong>m modules (TPM),<br />

the core computational unit concerned with the handl<strong>in</strong>g of secret keys could be<br />

made tamper-resistant. This may deter an occasional attacker, but a determ<strong>in</strong>ed<br />

and resourceful attacker is likely to break any exist<strong>in</strong>g shield<strong>in</strong>g or scrambl<strong>in</strong>g<br />

mechanism as research <strong>in</strong> smart cards and other hardware plat<strong>for</strong>ms (such as<br />

the X-Box gam<strong>in</strong>g console) has shown [6, 96, 84].<br />

Active countermeasures can further raise the bar <strong>for</strong> the attacker, <strong>for</strong> example<br />

by <strong>in</strong>corporat<strong>in</strong>g means <strong>for</strong> detect<strong>in</strong>g a physical breach, temperature extremes,<br />

voltage variation, and radiation, which is common <strong>in</strong> high-end security

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!