21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.3. Adversary Characteristics 81<br />

concentrated <strong>in</strong> a certa<strong>in</strong> area, he fully controls all reports from that area, but<br />

he has no <strong>in</strong>fluence on the reports from other areas.<br />

In general, the effectiveness of an attack highly varies with the geographical<br />

distribution of the compromised nodes. We describe this <strong>in</strong> the follow<strong>in</strong>g<br />

through the pr<strong>in</strong>ciple of locality. We then go on discuss<strong>in</strong>g the effects of several<br />

distributions of compromised nodes.<br />

Pr<strong>in</strong>ciple of Locality<br />

The <strong>in</strong>fluence on reports, which a compromised node can exercise, highly depends<br />

on the location of the node. The most powerful position is at the source<br />

of the report. If the compromised node itself creates a report, or a significant<br />

part of it, it can make up the report with arbitrarily generated data. The power<br />

of other nodes to verify such a report are limited and depend on application<br />

semantics (e.g., to check the plausibility of reported data) and sensor range.<br />

Similarly, if the receiver of a report is compromised, it may deliver arbitrary<br />

data to the query<strong>in</strong>g entity.<br />

The second most powerful location where a node can exercise <strong>in</strong>fluence on<br />

reports is either close to the receiver or close to the sender of a report. Here,<br />

the probability that messages travel through a compromised node is high and<br />

thus the node might have the opportunity to change the contents of a report by<br />

manipulat<strong>in</strong>g these messages.<br />

The threat of compromised nodes be<strong>in</strong>g located close to the receiver or be<strong>in</strong>g<br />

the receiver itself can be overcome by obta<strong>in</strong><strong>in</strong>g a report <strong>in</strong> a redundant<br />

manner, thus multiple receivers are established, which makes manipulations<br />

more difficult. In most cases, redundancy cannot be applied to the source of a<br />

report as easily.<br />

Locations that are far away from either the sender or the receiver have a<br />

much lower probability of <strong>in</strong>fluenc<strong>in</strong>g a report through message manipulation<br />

as the likel<strong>in</strong>ess that messages travel through specific nodes is low <strong>in</strong> densely<br />

populated networks. Only if few alternate routes exist, nodes become bottlenecks<br />

and draw traffic to them. This may be exploited by an attacker through<br />

simulat<strong>in</strong>g congestion <strong>in</strong> certa<strong>in</strong> areas, which may trigger the rerout<strong>in</strong>g of messages.<br />

The use of multiple paths that are spatially separated (discussed later <strong>in</strong><br />

Chapter 5) is a possible means to mitigate such threats.<br />

It can be expected that the distribution of compromised nodes determ<strong>in</strong>es<br />

how an attacker can <strong>in</strong>fluence the operations of a wireless sensor network. In<br />

the follow<strong>in</strong>g, we discuss some fundamental distribution patterns.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!