UNIT-4-EC-Adhoc and Sensor Networks
UNIT-4-EC-Adhoc and Sensor Networks
TABLE OF CONTENTS
4.1 Introduction: Security in Wireless Sensor Networks 4.1
From a set of sensor nodes in a given locality, only one final aggregated message may
be sent to the BS, so it is necessary to ensure that communication links are secure for
data exchange.
Data Confidentiality
Authentication
Data Integrity
Data Freshness
AD HOC and Wireless Sensor Networks 4.2
Availability
Self-Organization
Time synchronization
Source Localization
Scalability
Data Confidentiality
The confidentiality objective helps to protect information traveling between the sensor
nodes of the network or between the sensors and the base station from disclosure, since
an adversary having the appropriate equipment may eavesdrop on the communication.
Furthermore, by stealing routing information the adversary could introduce his own
malicious nodes into the network in an attempt to overhear the entire communication.
Authentication
It ensures that the communicating node is the one that it claims to be. An adversary
can not only modify data packets but also can change a packet stream by injecting
fabricated packets.
It is, therefore, essential for a receiver to have a mechanism to verify that the received
packets have indeed come from the actual sender node.
Data Integrity
Data Freshness
It implies that the data is recent and ensures that no adversary can replay old messages.
This requirement is especially important when the WSN nodes use shared-keys for
message communication, where a potential adversary can launch a replay attack using
the old key as the new key is being refreshed and propagated to all the nodes in the
WSN.
A nonce or time-specific counter may be added to each packet to check the freshness
of the packet.
Availability
Availability ensures that services and information can be accessed at the time that they
are required.
In sensor networks, there are many risks that could result in loss of availability such as
sensor node capturing and denial of service attacks.
Lack of availability may affect the operation of many critical real-time applications
like those in the healthcare sector that require a 24/7 operation that could even result in
the loss of life.
Self-Organization
Time synchronization
Most of the applications in sensor networks require time synchronization. Any security
mechanism for WSN should also be time-synchronized. A collaborative WSN may
require synchronization among a group of sensors.
AD HOC and Wireless Sensor Networks 4.4
Source Localization
For data transmission some applications use location information of the sink node. It is
important to give security to the location information.
Non-secured data can be controlled by the malicious node by sending false signal
strengths or replaying signals.
Scalability
WSN must be scalable to provide capacity for additional nodes. New nodes inser tion
and old nodes removal should be easy with no bad impact over the network operations.
WSN must have the richest set of different protocols to carryout application
requirements; a WSN protocol must handle a hostile environment.
Routing protocol should provide a high throughput, and a decrease packet loss ratio.
Routing algorithm should handle mobility and dynamic changing behavior in WSNs.
Unreliable wireless media can drop packets; routing protocols should prevent packet
loss. Designing a new routing protocol for WSN should consider the following
security and privacy issues.
Node Mobility
Coverage Problem
Lack of Association
AD HOC and Wireless Sensor Networks 4.5
Physical Vulnerability
Quality of Service
Node Mobility
The mobility sink node is used to collect data from all sensors. A static sink node
collects data from all sensors without changing its constant position. A mobile sink
node has its own effects on the network, e.g., performance and dynamic change
behavior. Routing protocols must provide better connectivity, an efficient energy
consumption, a controlled flooding mechanism, etc.
Coverage Problem
Unlike in wired networks where a separate dedicated transmission line can be provided
between a pair of end users, the radio channel used for communication in wireless
sensor networks is broadcast in nature and is shared by all nodes in the network.
Data transmitted by a node is received by all nodes within its direct transmission range.
So a malicious node could easily obtain data being transmitted in the network. This
problem can be minimized to a certain extent by using directional antennas.
The operating environments where wireless sensor networks are used may not always
be secure.
Lack of Association
Since these networks are dynamic in nature, a node can join or leave the network at
any point of the time. If no proper authentication mechanism is used for associating
nodes with a network, an intruder would be able to join into the network quite easily
and carry out his/her attacks.
Resources such as bandwidth, battery power, and computational power are scarce in
wireless sensor networks. Hence, it is difficult to implement complex cryptography-
based security mechanisms in such networks.
Physical vulnerability
Nodes in these networks are usually compact and hand-held in nature. They could get
damaged easily and are also vulnerable to theft.
Quality of Service
QoS is the function of its application. The proper congestion control provide s better
QoS. In WSNs, there is a minimum chance of congestion outside the base station area.
Congestion near the base station results into: channel occupancy, buffer overflow,
packet collision, channel contention, high data rate, and minimum node’s life.
Outside attacks are defined as attacks from nodes, which do not belong to a WSN;
insider attacks occur when legitimate nodes of a WSN behave in unintended or
unauthorized ways.
In mote-class attacks, an adversary attacks a WSN by using a few nodes with similar
capabilities to the network nodes; in laptop-class attacks, an adversary can use more
powerful devices (e.g., a laptop) to attack a WSN. These devices have greater
transmission range, processing power, and energy reserves than the network nodes.
In a sensor network, sensors monitor the changes of specific parameters or values and
report to the sink according to the requirement. While sending the report, the
information in transit may be attacked to provide wrong information to the base
stations or sinks. The attacks are:
AD HOC and Wireless Sensor Networks 4.8
Modification: Unauthorized party not only accesses the data but also tampers
with it. This threatens message integrity. The main purpose is to confuse or
mislead the parties involved in the communication protocol. This is usually aimed
at the network layer and the application layer, because of the richer semantics of
these layers.
4.5.1.1 Jamming
This is one of the Denial of Service Attacks in which the adversary attempts to disrupt
the operation of the network by broadcasting a high-energy signal.
Jamming attacks in WSNs, classifying them as constant (corrupts packets as they are
transmitted), deceptive (sends a constant stream of bytes into the network to make it
look like legitimate traffic), random (randomly alternates between sleep and jamming
to save energy), and reactive (transmits a jam signal when it senses traffic).
Given physical access to a node, an attacker can extract sensitive information such as
cryptographic keys or other data on the node.
One defense to this attack involves tamper-proofing the node’s physical package.
One of the countermeasures to such an attack is Rate Limiting to the MAC admission
control such that the network can ignore excessive requests, thus preventing the energy
drain caused by repeated transmissions.
A second technique is to use time division multiplexing where each node is allotted a
time slot in which it can transmit.
4.5.2.2 Collision
This is very much similar to the continuous channel attack. A collision occurs when
two nodes attempt to transmit on the same frequency simultaneously. When packets
collide, a change will likely occur in the data portion, causing a checksum mismatch at
the receiving end. The packet will then be discarded as invalid. A typical defense
against collisions is the use of error-correcting codes.
4.5.2.3 Unfairness
This kind of attack is a partial DOS attack, but results in marginal performance
degradation.
One major defensive measure against such attacks is the usage of small frames, so that
any individual node seizes the channel for a smaller duration only.
4.5.2.4 Interrogation
To put a defense against such type of attacks a node can limit itself in accepting
connections from same identity or use Anti replay protection and strong link-layer
authentication.
In this attack, a single node presents multiple identities to all other nodes in the WSN.
This may mislead other nodes, and hence routes believed to be disjoint with respect to
node can have the same adversary node.
A countermeasure to Sybil Attack is by using a unique shared symmetric key for each
node with the base station.
Sinkhole attacks normally occur when compromised node send fake routing
information to other nodes in the network with aim of attracting as many traffic as
possible.
This attack exploits Hello packets that are required in many protocols to announce
nodes to their neighbors. A node receiving such packets may assume that it is in radio
range of the sender.
A laptop class adversary can send this kind of packet to all sensor nodes in the network
so that they believe the compromised node belongs to their neighbors. This causes a
large number of nodes sending packets to this imaginary neighbour and thus into
oblivion. Authentication is the key solution to such attacks. Such attacks can easily be
avoided by verify bi-directionality of a link before taking action based on the
information received over that link.
Node capture attack is a serious attack through which an intruder can performs various
operations on the network and can easily compromise the entire network. It is one of
the hazardous attack in WSNs.
A single node capture is sufficient for an attacker to take over the entire network.
AD HOC and Wireless Sensor Networks 4.12
In Black Hole attack, a malicious node falsely advertises good paths (e.g., shortest path
or most stable path) to the destination node during the path-finding process (in on-
demand routing protocols) or in the route update messages (in table-driven routing
protocols). The intention of the malicious node could be to hinder the path -finding
process or to intercept all data packets being sent to the destination node concerned.
Malicious or attacking nodes can however refuse to route certain messages and drop
them. If they drop all the packets through them, then it is called a Black Hole Attack.
However if they selectively forward the packets, then it is called selective forwarding.
To overcome this, Multi path routing can be used in combination with random
selection of paths to destination, or braided paths can be used which represent paths
which have no common link or which do not have two consecutive common nodes, or
use implicit acknowledgments, which ensure that packets are forwarded as they were
sent.
An adversary can tunnel messages received in one part of the network over a low
latency link and replay them in another part of the network. This is usually done with
the coordination of two adversary nodes, where the nodes try to understate their
distance from each other, by broadcasting packets along an out-of-bound channel
available only to the attacker.
To overcome this, the traffic is routed to the base station along a path, which is always
geographically shortest or use very tight time synchronization among the nodes, which
is infeasible in practical environments.
The most direct attack against a routing protocol in any network is to target the routing
information itself while it is being exchanged between nodes. An attacker may spoof,
alter, or replay routing information in order to disrupt traffic in the network. These
disruptions include the creation of routing loops, attracting or repelling network traffic
from select nodes, extending and shortening source routes, generating fake error
messages, partitioning the network, and increasing end-to-end latency.
4.5.3.7 Misdirection
This is a more active attack in which a malicious node present in the routing path can
send the packets in wrong direction through which the destination is unreachable. In
place of sending the packets in correct direction the attacker misdirects those and that
too towards one node and thus this node may be victimized.
4.5.3.8 Homing
In a homing attack, the attacker looks at network traffic to deduce the geographic
location of critical nodes, such as cluster heads or neighbors of the base station. The
attacker can then physically disable these nodes. This leads to another type of black
hole attack.
4.5.4.1 Flooding
Sometime, the malicious node can cause immense traffic of useless messages on the
network. This is known as the flooding. Sometimes, malicious nodes replay some
actual broadcast messages, and hence generating useless traffic on the network. This
can cause congestion, and may eventually lead to the exhaustion of complete nodes.
This is a form of Denial of Service attack.
The jamming effect of a jammer depends on its radio transmitter power, location and
influence on the network or the targeted node. A jammer may jams a network in
various ways to make the jamming as effective as possible. Basically, a jammer can be
either Proactive and Reactive
Proactive jammer
Proactive jammer transmits jamming (interfering) signals whether or not there is data
communication in a network. It sends packets or random bits on the channel it is
operating on, putting all the others nodes on that channel in non-operating modes.
However, it does not switch channels and operates on only one channel until its energy
is exhausted. There are three basic types of proactive jammers: constant, deceptive and
random
AD HOC and Wireless Sensor Networks 4.15
Constant jammer, emits continuous, random bits without following the CSMA
protocol. A constant jammer prevents legitimate nodes from communicating with each
other by causing the wireless media to be constantly busy. This type of attack is energy
inefficient and easy to detect but is very easy to launch and can damage network
communications.
Deceptive jammer, sends a constant stream of bytes into the network to make it look
like legitimate traffic.
Random jammer, intermittently transmits either random bits or regular packets into
networks. It continuously switches between two states: sleep phase and jamming
phase. It sleeps for a certain time of period and then becomes active for jamming
before returning back to a sleep state.
Reactive Jammer
Reactive jammer starts jamming only when it observes a network activity occurs on a
certain channel. As a result, a reactive jammer targets on compromising the reception
of a message. It can disrupt both small and large sized packets. Since it has to
constantly monitor the network, reactive jammer is less energy efficient than random
jammer. However, it is much more difficult to detect a reactive jammer than a
proactive jammer because the Packet Delivery Ratio (PDR) cannot be determined
accurately in practice. There are two different ways to implement a reactive jammer
Reactive RTS/CTS jammer, jams the network when it senses a request-to-send
(RTS) message is being transmitted from a sender. It starts jamming the channel as
soon as the RTS is sent. In this way, the receiver will not send back clear-to-send
(CTS) reply because the RTS packet sent from a sender is distorted. Then, the sender
will not send data because it believes the receiver is busy with another on-going
transmission.
Reactive Data/ACK jammer, jams the network by corrupting the transmissions of
data or acknowledgement (ACK) packets. This type of jammer can corrupt data
packets, or it waits until the data packets reach the receiver and then corrupts the ACK
packets. The corruptions of both data packets and ACK messages will lead to re-
transmissions at the sender end.
4.6.2 Countermeasures for Proactive Jammer
In proactive jamming, the jammer chokes the bandwidth so that a transmitter is unable
to transmit. Therefore, carrier-sensing thresholds can be used to detect such type of
jammers. When jamming is detected, nodes in the network can map the jammed area
and re-route traffic, switch channel, or perform spatial retreat to counteract this
jamming act.
AD HOC and Wireless Sensor Networks 4.16
Reactive Jamming detection using BER. It is used to detect jamming using the bit error
rate (BER) for reactive jammers that keep the received signal strength (RSS) low while
introducing disruption in a packet.
By looking at the RSS of each bit during the reception, it identifies the cause of bit
errors for individual packet using predetermined knowledge, error correcting codes
(ECC), or wired node chain systems. If the error is due to weak signal, the RSS should
be low. .
If the RSS value is high for a bit error, there are external interference or jamming.
Assuming nodes can assess the expected local interference, the sequential jamming
probability test calculates the marginal likelihood of errors due to 10 unintentional
collisions. If this value is less than the log of the r atio of targeted probability for a
missed alarm to the targeted probability, then there is jamming and an alarm is raised.
If the marginal likelihood is less than the ratio, there is no jamming and the sequence is
reset. There is also a possibility that no conclusion is made until there are more
conclusive evidences for jamming.
Countermeasures
Some attacks in the physical layer are quite hard to cope with. For example, after
sensors are deployed in the field, it is difficult or infeasible to prevent every single
sensor from device tampering. Therefore, although there are some mechanisms that
attempt to reduce the occurrences of attacks, more of them focus on protecting
information from divulgence.
AD HOC and Wireless Sensor Networks 4.17
Access Restriction
Obviously, restricting adversaries from physically accessing or getting close to sensors
is effective on tampering attacks. It is good to have such restrictions if we can, but
unfortunately, they are either difficult or infeasible in most cases. Therefore, we
usually have to fall back on another type of restrictions: communication media access
restriction.
A few techniques exist nowadays that prevent attackers from accessing the wireless
medium in use, including sleeping/hibernating and spread spectrum communication.
This technique uses either analog schemes where the frequency variation is
continuous, or digital schemes (e.g. frequency hopping) where the frequency variation
is abrupt.
By this way, attackers cannot easily locate the communication channel, and are thus
restrained from attacking. The spread spectrum communications are not yet feasible
for WSNs that are usually constrained in resources. Directional antenna is another
technique for access restriction. By confining the directions of the signal propagation,
it reduces the chances of adversaries accessing the communication channel.
Encryption
In general, cryptography is the all-purpose solution to achieve security goals in WSNs.
To protect data confidentiality, cryptography is indispensable.
Cryptography can be applied to the data stored on sensors. Once data are encrypted,
even if the sensors are captured, it is difficult for the adversaries to obtain useful
information. A more costly encryption can yield higher strength, but it also drains the
limited precious energy faster and needs more memory. More often, cryptography is
applied to the data in transmission.
There are basically two categories of cryptographic mechanisms: asymmetric and
symmetric. In asymmetric mechanisms (e.g. RSA), the keys used for encryption and
decryption are different, allowing for easier key distribution. It usually requires a third
trusted party called Certificate Authority (CA) to distribute and check certificates so
that the identity of the users using a certain key can be verified. However, due to the
lack of a priori trust relationship and infrastructure support, it is infeasible to have CAs
in WSNs.
Furthermore, asymmetric cryptography usually consumes more resources such as
computation and memory.
AD HOC and Wireless Sensor Networks 4.18
Black Hole attack occurs under Dos (Denial of service) attack in the network layer of
OSI Model. In this kind of attacks the malicious node forgery other nodes by
announcing a shortest false route to the destination then attracts additional traffic and
drops continually the packets.
During data transmission the source node sends a Route REQuest (RREQ) message to
all the nodes including malicious node. Given that a malicious node may become
active by receiving RREQ message and replies using Route REPly (RREP) message.
It attracts additional traffic by falsely claiming the shortest route to the destination.
This causes blocking and increasing the energy consumption in each node, leading to
the formation of routing holes which disturb or stop the network functionality.
The Fig. 4.3 illustrates the Black hole attack: while the source node A broadcasts an
RREQ messages to discover the route for sending packets to destination node C. An
RREQ broadcast from node A is received by neighbouring nodes B, D and the
malicious node E. The RREP message sent by the malicious attacker node E is the first
message reaching the source node. This last updates its routing table for the new route
to the intended node destination, discarding any RREP message from other
neighbouring nodes including the actual node destination and starts sending the
buffered data packets immediately. In the same time the Black hole node drops all
coming data packets rather than forwarding.
Figure 4.2 Black hole Attack schematic illustration using RREQ and RREP Packet
Source : Protocol and Architecture for Wireless Sensor Networks by Holger Karl ,
Andreas willig
AD HOC and Wireless Sensor Networks 4.19
Countermeasures
Routing may be one of the most attractive attack targets in WSNs. If we can exclude
attackers from participating in the routing process, i.e. restrict them from accessing
routing, a large number of attacks in the network layer will be prevented or alleviated.
This alleviates the impact of routing attacks, although does not prevent these attacks. A
general way is to use authentication methods. With authentication, it can be easily
determined whether a sensor can participate in routing or not.
Data are authenticated hop by hop between associated nodes until they reach the base
station. Hop-to-hop authentication can be combined with mu lti-path routing. This
paths can be physical, meaning that messages are routed through multiple physically
different communication paths.
AD HOC and Wireless Sensor Networks 4.20
Sometimes attackers do have chances to send false routing information into the
network, e.g. during route discovery stages. If the false information does not lead to
network failure such as broken routes, we really cannot do much about it. Otherwise,
we can apply the idea of misbehaviour detection method.
For example, watchdog or IDS (Intrusion Detection System) may find that some node
fails to route messages along the routing path due to the wrong information it keeps.
This anomaly of route failure may trigger out an alarm.
Nodes can start to trace the source of false routing information. The Reputation can
also be maintained, depending on whether nodes are providing valid routing
information.
For example, an adversary advertising a very high-quality route to the base station to
every node in the network could cause a large number of nodes to attempt to use this
route, but those nodes sufficiently far away from the adversary would be sending
packets into oblivion. The network is left in a state of confusion.
Source : Protocol and Architecture for Wireless Sensor Networks by Holger Karl ,
Andreas willig
AD HOC and Wireless Sensor Networks 4.21
Countermeasures
In multi-path multi-base station data forwarding technique, each sensor node maintains
number of different secrets (keys) in a multiple tree.
Sensor node can forward its sensed data to multiple routes by using these secrets.
There are multiple base stations in the network that have control over specific number
of nodes and also, there are common means of communication among base stations.
Each base station has all the secrets that are shared by all the sensor nodes, covered by
it, according to the key assignment protocol.
The mobile nodes use a threshold value to check whether its neighbors are intruders or
not.
When the number of route request packets broadcasted by a node exceeds the
predefined threshold value, it is treated as an intruder and the node stops providing its
services to the intruder.
Cryptography is one of the most common and reliable means to ensure security. It is
the study of the principles, techniques, and algorithms by which information is
transformed into a disguised version which no unauthorized person can read, but
which can be recovered in its original form by an intended recipient.
An authentic receiver can decrypt/decode the ciphertext back into plaintext by the
process of decryption. The processes of encryption and decryption are governed by
keys, which are small amounts of information used by the cryptographic algorithms.
When the key is to be kept secret to ensure the security of the system, it is called a
secret key. The secure administration of cryptographic keys is called key management.
AD HOC and Wireless Sensor Networks 4.22
The four main goals of cryptography are confidentiality, integrity, authentication (the
receiver should be able to identify the sender and verify that the message actually came
from that sender), and non-repudiation.
There are two major kinds of cryptographic algorithms: symmetric key algorithms,
which use the same key for encryption and decryption, and asymmetric key
algorithms, which use two different keys for encryption and decryption.
Symmetric key algorithms are usually faster to execute electronically, but require a
secret key to be shared between the sender and receiver. If the same key is used among
more than two parties, a breach of security at any one point makes the whole system
vulnerable.
The asymmetric key algorithms are based on some mathematical principles which
make it infeasible or impossible to obtain on e key from another; therefore, one of the
keys can be made public while the other is kept secret (private). This is called public
key cryptography.
Symmetric key algorithms rely on the presence of the shared key at both the sender
and receiver, which has been exchanged by some previous arrangement.
There are two kinds of symmetric key algorithms, one involving block ciphers and the
other stream ciphers. A block cipher is an encryption scheme in which the plaintext is
broken into fixed-length segments called blocks, and the blocks are encrypted one at a
time.
A transposition cipher permutes the alphabet in the plaintext to produce the ciphertext.
Figure 4.5 (a) illustrates the encryption using substitution, and Figure 4.5 (b) shows a
transposition cipher. The block length used is five.
AD HOC and Wireless Sensor Networks 4.23
A stream cipher is a symmetric key cipher where plaintext digits are combined with a
pseudorandom cipher digit stream. In a stream cipher, each plaintext digit is encrypted
one at a time with the corresponding digit of the keystream, to give a digit of the
ciphertext stream
One of the simplest stream ciphers is the Vernam cipher, which uses a key of the same
length as the plaintext for encryption. For example, if the plaintext is the binary string
10010100, and the key is 01011001, then the encrypted string is given by the XOR of
the plaintext and key, to be 11001101. The plaintext is again recovered by XOR the
ciphertext with the same key. If the key is randomly chosen, transported securely to
the receiver, and used for only one communication, this forms the one-time pad which
has proven to be the most secure of all cryptographic systems.
AD HOC and Wireless Sensor Networks 4.24
Asymmetric key (or public key) algorithms use different keys at the sender and
receiver ends for encryption and decryption, respectively.
Hence, it is not possible for adversaries to derive D given E. Only the receiver can
decrypt C using the private key D.
A very popular example of public key cryptography is the RSA system d eveloped by
Rivest, Shamir, and Adleman, which is based on the integer factorization problem.
Digital signatures schemes are also based on public key encryption. In these schemes,
the functions E and D are chosen such that D (E ( M)) = E (D (M)) = M for any message
M. These are called reversible public key systems.
In this case, the person who wishes to sign a document encrypts it using his/her private
key D, which is known only to him/her. Anybody who has his/her public key E can
decrypt it and obtain the original document, if it has been signed by the corresponding
sender.
The primary goal of key distribution is to share a secret among a specified set of
participants. There are several methods that can be employed to perform this
operation, all of them requiring varying amounts of initial configuration,
communication, and computation. The main approaches to key distribution are
Key Pre-distribution
Key Transport
Key Agreement
AD HOC and Wireless Sensor Networks 4.25
Key Pre-distribution
Key pre-distribution, as the name suggests, involves distributing keys to all interested
parties before the start of communication. This method involves much less
communication and computation, but all participants must be known a priori, during
the initial configuration.
Key Transport
In key transport systems, one of the communicating entities generates keys and
transports them to the other members. The simplest scheme assumes that a shared key
already exists among the participating members.
This prior shared key is used to encrypt a new key and is transmitted to all
corresponding nodes. Only those nodes which have the prior shared key can decrypt it.
This is called the key Encrypting Key (KEK) method. However, the existence of a
prior key cannot always be assumed. If the public key infrastructure (PKI) is present,
the key can be encrypted with each participant's public key and transported to it.
Key Agreement
Most key agreement schemes are based on asymmetric key algorithms. They are used
when two or more people want to agree upon a secret key, which will then be used for
further communication.
Key agreement protocols are used to establish a secure context over which a session
can be run, starting with many parties who wish to communicate and an insecure
channel.
In group key agreement schemes, each participant contributes a part to the secret key.
These need the least amount of pre-configuration, but such schemes have high
computational complexity. The most popular key agreement schemes use the Diffie-
Hellman exchange, an asymmetric key algorithm based on discrete logarithms.
AD HOC and Wireless Sensor Networks 4.26
Routing attacks can cripple it easily and degrade the operation of WSNs significantly.
Hence, providing security becomes a challenging task in the networks.
Various other factors which make the task of ensuring secure communication in
wireless sensor networks difficult include the mobility of nodes, a promiscuous mode
of operation, limited processing power, and limited availability of resources such as
battery power, bandwidth, and memory.
The secure routing protocol should be resilient in the presence of malicious nodes that
may launch various types of attacks. Some of the mechanisms proposed for secure
routing.
The fundamental requisites of a secure routing protocol for wireless sensor networks
are listed as follows:
A secure routing protocol should be able to detect the presence of malicious nodes in
the network and should avoid the participation of such nodes in the routing process.
Even if such malicious nodes participate in the route discovery process, the routing
protocol should choose paths that do not include such nodes.
If a route between the source and the destination nodes exists, the routing protocol
should be able to find the route, and should also ensure the correctness of the selected
route.
Information disclosure attack may lead to the discovery of the network topology by the
malicious nodes. Once the network topology is known, the attacker may try to study
the traffic pattern in the network.
If some of the nodes are found to be more active compared to others, the attacker may
try to mount (e.g., DoS) attacks on such bottleneck nodes. This may ultimately affect
the on-going routing process.
AD HOC and Wireless Sensor Networks 4.27
The routing protocol must be self-stable in the sense that it must be able to revert to its
normal operating state within a finite amount of time after a passive or an active attack.
The routing protocol should take care that these attacks do not permanently disrupt the
routing process.
The protocol must also ensure Byzantine robustness, that is, the protocol should work
properly even if some of the nodes, which were earlier participating in the routing
process, turn out to become malicious at a later point of time or are intentionally
damaged.
SPIN is abbreviation of sensor protocol for information via negotiation. This protocol
is defined to use to remove the deficiency like flooding and gossiping that occurs in
other protocols.
The main idea is that the sharing of data, which is sensed by the node, might take more
resources as compare to the meta-data, which is just a descriptor about the data sensed,
by the node.
The resource manager in each node monitors its resources and adapts their
functionality accordingly.
SNEP is sensor network encryption protocol. The SNEP protocol offers the following
nice properties:
AD HOC and Wireless Sensor Networks 4.28
Semantic security: Since the counter value is incremented after each message,
the same message is encrypted differently each time. The counter value is long
enough that it never repeats within the lifetime of the node.
Data authentication: If the MAC verifies correctly, a receiver can be assured that
the message originated from the claimed sender.
Replay protection: The counter value in the MAC prevents replaying old
messages. Note that if the counter were not present in the MAC, an advers ary
could easily replay messages.
Weak freshness: If the message verified correctly, a receiver knows that the
message must have been sent after the previous message it received correctly (that
had a lower counter value). This enforces a message ordering and yields weak
freshness.
Encryption key
Source : Protocol and Architecture for Wireless Sensor Networks by Holger Karl ,
Andreas willig
AD HOC and Wireless Sensor Networks 4.29
The two communicating parties A and B share a master secret key XAB, and they derive
independent keys using the pseudorandom function F: encryption keys KAB = FX (1) and
KBA = FX (3) for each direction of communication, and MAC keys K’AB = FX (2) and
K’BA = FX (4) for each direction of communication.
The combination of these mechanisms form our Sensor Network Encryption Protocol
SNEP.
The encrypted data has the following format: E = {M} (K, C), where M is the data, the
encryption key is K, and the counter is C. The MAC is M = MAC (K’, C||E). The complete
message that A sends to B is
Node A achieves strong data freshness for a response from node B through a nonce NA.
Node A generates NA randomly and sends it along with a request message RA to node B.
The simplest way to achieve strong freshness is for B to return the nonce with the response
message RB in an authenticated protocol.
AD HOC and Wireless Sensor Networks 4.30
To achieve small SNEP messages, we assume that the communicating parties A and B
know each other’s counter values CA and CB and so the counter does not need to be added
to each encrypted message.
Source : Protocol and Architecture for Wireless Sensor Networks by Holger Karl ,
Andreas willig
If party A realizes that the counter CB of party B is not synchronized any more, A can
request the current counter of B using a nonce NA to ensure strong freshness of the
reply:
AD HOC and Wireless Sensor Networks 4.31
4.12.2.1 Authentication
To send an authenticated packet, the base station simply computes a MAC on the
packet with a key that is secret at that point in time.
When a node gets a packet, it can verify that the corresponding MAC key was not yet
disclosed by the base. Since a receiving node is assured that the MAC key is known
only by the base station, the receiving node is assured that no adversary could have
altered the packet in transit.
The node stores the packet in a buffer. At the time of key disclosure, the base station
broadcasts the verification key to all receivers. When a node receives the disclosed
key, it can easily verify the correctness of the key. If the key is correct, the node can
now use it to authenticate the packet stored in its buffer
Each MAC key is a key of a key chain, generated by a public one-way function F. To
generate the one-way key chain, the sender chooses the last key Kn of the chain randomly,
and repeatedly applies F to compute all other keys: K i = F (Ki+1).
Each node can easily perform time synchronization and retrieve an authenticated key
of the key chain for the commitment in a secure and authenticated manner.
AD HOC and Wireless Sensor Networks 4.32
For example, Figure 4.10 shows an example of µTESLA. Each key of the key chain
corresponds to a time interval and all packets sent within one time interval are
authenticated with the same key. The time until keys of a particular interval are
disclosed is 2 time intervals in this example.
Assume that the receiver node is loosely time synchronized and knows K0 (a commitment
to the key chain) in an authenticated way. Packets P1 and P2 sent in interval 1 contain a
MAC with key K1. Packet P3 has a MAC using key K2. So far, the receiver cannot
authenticate any packets yet. Let us assume that packets P4, P5, and P6 are all lost, as well
as the packet that discloses key K1, so the receiver can still not authenticate P1, P2, or P3.
In interval 4 the base station broadcasts key K2, which the node authenticates by verifying
K0 = F (F (K2)), and hence knows also K1 = F (K2), so it can authenticate packets P1, P2
with K1, and P3 with K2.
Instead of adding a disclosed key to each data packet, the key disclosure is independent
from the packets broadcast, and is tied to time intervals. Within the context of
µTESLA, the sender broadcasts the current key periodically in a special packet.
Sender setup: The sender first generates a sequence of secret keys (or key chain). To
generate the one-way key chain of length n, the sender chooses the last key Kn
randomly, and generates the remaining values by successively applying a one-way
function F.
Sending authenticated packets: Time is divided into time intervals and the sender
associates each key of the one-way key chain with one time interval. In time interval
t, the sender uses the key of the current interval, Kt, to compute the message
authentication code (MAC) of packets in that interval.
AD HOC and Wireless Sensor Networks 4.33
Bootstrapping new receivers: The important property of the one-way key chain is
that once the receiver has an authenticated key of the chain, subsequent keys of the
chain are self-authenticating, which means that the receiver can easily and efficiently
authenticate subsequent keys of the one-way key chain using the one authenticated
key. For example, if a receiver has an authenticated value K i of the key chain, it can
easily authenticate Ki+1, by verifying Ki = F (Ki+1). Therefore to bootstrap µTESLA,
each receiver needs to have one authentic key of the one-way key chain as a
commitment to the entire chain
Authenticating packets: When a receiver receives the packets with the MAC, it
needs to ensure that the packet could not have been spoofed by an adversary. The
threat is that the adversary already knows the disclosed key of a time interval and
so it could forge the packet since it knows the key used to compu te the MAC.
Hence the receiver needs to be sure that the sender did not disclose the key yet
which corresponds to an incoming packet, which implies that no adversary could
have forged the contents. This is called the security condition, which receivers
check for all incoming packets.
The cases of delivering only a single packet on the one hand and of delivering a
number or even an infinite stream of packets on the other hand differ substantially in
the protocol mechanisms usable in either case.
In the single packet delivery problem, a single packet must be reliably transported
between two nodes.
In the block delivery problem, a finite data block comprising multiple packets must be
delivered to a sensor or a set of sensors.
It can be assumed that most communications in sensor networks are not between
arbitrary peer nodes, but information flows either from sensor nodes towards a single
or a few sink/gateway nodes or in critical environments such as military applications,
it is necessary that the sink is able to transmit the data to the sensors in the least
possible time.
In the case of sensor to sensor communications, the sensors monitor a region and
transmit the collected data packets through routes (intermediate sensor nodes) to the
sinks.
In the case of guaranteed delivery, it is expected that all transmitted packets reach the
destination; anything else is considered a failure. In general, guaranteed delivery is
challenging and costly in terms of energy and bandwidth expenditure, specifically over
links with sometimes high error rates like wireless ones.
The concept of stochastic delivery guarantees allows a limited amount of losses. There
are several ways to specify stochastic guarantees. For example, one might specify that
for periodic data delivery within every k subsequent packets at least m packets must
reach the destination; any number below m is considered a failur
AD HOC and Wireless Sensor Networks 4.35