21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.2. Attack Objectives 75<br />

Critical decisions are often based on aggregated data, it is there<strong>for</strong>e essential<br />

that the data is “correct” <strong>in</strong> the sense that even if some <strong>in</strong>put on which the<br />

aggregation is based is corrupt, the deviation from the “true” result (the result<br />

that is obta<strong>in</strong>ed when no maliciously or otherwise <strong>in</strong>duced errors are <strong>in</strong>volved)<br />

is m<strong>in</strong>imal. A viable attack goal is there<strong>for</strong>e the manipulation of data such<br />

that a false report is be<strong>in</strong>g accepted by the issuer of a query. Without any<br />

precautions, even an attacker restricted to manipulat<strong>in</strong>g very few <strong>in</strong>put values<br />

could significantly <strong>in</strong>fluence the outcome of an aggregation. Consequently,<br />

techniques <strong>for</strong> detect<strong>in</strong>g or at least mitigat<strong>in</strong>g the effects of faulty <strong>in</strong>put are<br />

required.<br />

Perfect resilience aga<strong>in</strong>st manipulated <strong>in</strong>put data is impossible to achieve<br />

if the manipulated parts cannot be identified (which is usually the case). The<br />

secure aggregations schemes by Wagner [186] and Przydatek et al. [146] there<strong>for</strong>e<br />

aim at approximate <strong>in</strong>tegrity, where the result y ∗ of an aggregation with<br />

partially corrupt <strong>in</strong>put deviates from the result y that would have been obta<strong>in</strong>ed<br />

<strong>in</strong> absence of an attacker only by a small value ε, i.e. |y ∗ − y| < ε. We note that<br />

some slight deviation from the “true” value must be dealt with even when no<br />

attacker is active, s<strong>in</strong>ce sensor data is <strong>in</strong>herently subject to noise.<br />

S<strong>in</strong>ce some cost is <strong>in</strong>volved <strong>in</strong> aggregation, aggregated data should be considered<br />

more valuable than raw sensor data. There<strong>for</strong>e, it is often appropriate<br />

to restrict read access to it and allow only authorized parties to obta<strong>in</strong> such data<br />

even if access to raw sensor data is unrestricted.<br />

The availability of aggregated data is endangered when the aggregat<strong>in</strong>g node<br />

is compromised by the attacker. This would allow the attacker to delay or suppress<br />

a report, at least temporarily. As “aggregator” is likely to be implemented<br />

as a role <strong>in</strong> a sensor network, there is noth<strong>in</strong>g to prevent another node from assum<strong>in</strong>g<br />

this role. If the answer to a query is not delivered <strong>in</strong> time, a role switch<br />

could be triggered, the new aggregat<strong>in</strong>g node would repeat the aggregation process<br />

and f<strong>in</strong>ally deliver the report. The suppression of data has the disadvantage<br />

that other nodes can detect the malfunction<strong>in</strong>g, which could be used by an <strong>in</strong>trusion<br />

detection system to mark the respective node as be<strong>in</strong>g “suspect” and<br />

eventually isolate them.<br />

The “orig<strong>in</strong>” of aggregated, higher-level data is determ<strong>in</strong>ed by the orig<strong>in</strong> of<br />

the raw data that serves as <strong>in</strong>put to the aggregation process. Thus, the contextual<br />

<strong>in</strong><strong>for</strong>mation that is attributed to the raw data, such as location and time, may<br />

be ma<strong>in</strong>ta<strong>in</strong>ed <strong>in</strong> the aggregated data. However, the orig<strong>in</strong> of aggregated (i.e.,<br />

processed) data becomes blurry and often such <strong>in</strong><strong>for</strong>mation will be discarded<br />

<strong>for</strong> efficiency reasons.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!