13.01.2013 Views

Calculating trust in sensor networks

Calculating trust in sensor networks

Calculating trust in sensor networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A malicious node may refuse to forward all or some packets that it receives. This is known<br />

as a blackhole or a greyhole-attack. These attacks work if the attacker is able to <strong>in</strong>ject<br />

itself <strong>in</strong>to a route.<br />

A s<strong>in</strong>khole is a node that tries to lure all possible routes to itself by advertis<strong>in</strong>g itself as a<br />

very high-quality candidate to other nodes. A laptop that disguises itself as a node may<br />

use a high-powered radio to advertise itself to the whole network. As most communications<br />

from the network are towards the s<strong>in</strong>k-node, a s<strong>in</strong>khole can effectively take over the network<br />

by advertis<strong>in</strong>g itself as the best candidate for rout<strong>in</strong>g packets to the s<strong>in</strong>k. A malicious<br />

node may also launch a sybil-attack, <strong>in</strong> which it disguises itself as several nodes.<br />

An attacker may also launch a wormhole-attack on the network. A wormhole occurs when<br />

the traffic of one part of the network is relayed by a low-latency l<strong>in</strong>k to another part of<br />

the network. This can effectively create a s<strong>in</strong>khole s<strong>in</strong>ce the attacker is able to create a<br />

shorter connection to the s<strong>in</strong>k from a distant part of the network.<br />

An attacker can also spoof l<strong>in</strong>k layer acknowledgements for overheard packets. This can<br />

be used to advertise a weak l<strong>in</strong>k as a strong l<strong>in</strong>k, or a dead node as a live node.<br />

A method of combat<strong>in</strong>g some of these attacks is us<strong>in</strong>g l<strong>in</strong>k-layer encryption. This effectively<br />

elim<strong>in</strong>ates all but the wormhole-attack [KW03]. Wormholes may be detected by some<br />

methods, for <strong>in</strong>stance geographic rout<strong>in</strong>g protocols can notice if a route advertised through<br />

a wormhole is well above their normal transmission ranges.<br />

Eventually, if a node is compromised and the attacker gets around any possible encryption<br />

or authentication mechanisms, there exists no possible way to counter any of the attacks<br />

described above. The follow<strong>in</strong>g chapter will give one possible solution to the problem of<br />

compromised nodes, distributed <strong>trust</strong> management.<br />

2.5 Summary<br />

Sensor <strong>networks</strong> are ad hoc wireless <strong>networks</strong> formed by very small autonomous sens<strong>in</strong>g<br />

devices. These <strong>sensor</strong>s typically conta<strong>in</strong> a radio, a CPU, a small amount of memory and<br />

run some sort of an embedded operat<strong>in</strong>g system complete with their on network stacks.<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!