Download Trusted embedded System Operating System (TeSOS)
Transcript
In a similar approach, [LS05b] deterministically divides the set of nodes into partitions such that nodes of dierent partitions can not establish a direct link key. Resilience is increased since now a coalition of λ nodes from the same partition is required to compromise all other link keys. + An approach based on a polynomials was proposed in [BDSV 98]. In this scheme, a symmetrical polynomial P (x, y) = P (y, x) with coecients from used to derive pair-wise link keys. Each node polynomial. For node ni ni GF (q) for suciently large prime to derive the common key Kij with node nj , q is fi (x) = P (i, x) of the it simply evaluates fi (j). stores a localized version λ of coecients of P determines the resilience of the scheme in the sense that a λ + 1 nodes is needed to derive all link keys. Similar to previous trade-o approaches, The number coalition of [LN03b] proposes to partition the WSN, distributing multiple polynomials and thus sacricing key connectivity for scalability and/or resilience, since polynomials can be smaller but some node pairs may not have a shared polynomial to derive a common key from. The polynomials to store on each node can be selected randomly, in a grouped fashion to reduce communication overhead or based on available deployment topology information as proposed in [LN03c]. Probabilistic Pair-wise Schemes The amount of required key storage for pre-distributed pair-wise keys is reduced in [EG02, CPS03] by storing only N ∗p keys, where 0≤p≤1 is the probability that any two nodes will be able to communicate in the resulting system. Another approach to modify the fraction of keys known + to each node is presented in [DDH 04], where an approximate knowledge of the later physical topology is assumed and keys are distributed where the likelihood of reachability is large. The authors of [ZSJ03] assume that the adversary needs a minimum time node. In the deployment or upgrade phase, they deploy a node keyed hash functions fx (·) and hx (·) where x A t to compromise a with a master key Km , two is a node identity string, and a derived device key KA = hA (Km ). t, A can establish a pair-wise key KAB with any discovered node B KAB = fKB (A), since B still knows its derived key KB and A can derive it as KB = hB (Km ). After time t, key Km is deleted but KA is kept. As a result, only new nodes with knowledge of Km can establish new links with node A. To establish keys with sleeping nodes that do not wake up until t, [ZSJ03] suggests that A asks available nodes for a list of node IDs within Within the time frame using the area and derives the corresponding link keys in advance. of this scheme are probabilistic, but can be very good if t Key connectivity and resilience is chosen correctly. However, results + on residual memory traces [HSH 08] and the sensor node's very limited resistance to physical attacks [HBH05] limit the practicality of this solution. Enhancements to Pair-wise Schemes Several protocols require an additional key discovery phase after deployment to determine what peers are reachable, whether link keys can be established with them and what other nodes can be reached via these links. In this phase, typically each node broadcasts the list of key IDs from its key chain and observes the corresponding announcements of any neighbors. The communication load in this phase can be reduced by grouping key IDs such that all IDs in a group are known from the corresponding group ID [HLV04] or, in probabilistic key distribution, by using a Pseudo-Random Function (PRF) to generate the list of IDs known to each node [ZSJ03] and only transmitting the respective PRF seed. The storage complexity can be further reduced by grouping l link keys into a single localized master key. This reduces resilience as any compromised node will compromise the communication link security of of l [LS05b]. l−1 other nodes, however, the required storage is also reduced by a factor A similar idea is described in [DCL04], where multiple master keys are used in combination with random nonces and a PRF to reduce storage. Each generation of nodes uses its own master key as well as derived keys of the master keys of future (anticipated) generations. 30