Figure 2: A bound on probability that an adversary col-
lects all l parts from one layer for L = 100, t = 10, and
l = 3,4,5, 6,9 respectively for t · l < K < L/t.
Otherwise, in the case of a single transmitted mes-
sage, the strategy of the adversary is trivial - it chooses
l transmitting nodes from any layer.
The situation is much more complicated when the
adversary can observe simultaneous transmission of
many, say N messages and then capture some nodes.
The number of message pieces transmitted through
different nodes is not the same. The adversary may
increase his chances by choosing the nodes with rela-
tively many transmissions going through.
Since it is optimal to attack one layer, we consider
a single layer. To corrupt one of N messages the ad-
versary must collect all l pieces of this message. As-
sume that the adversary is able to corrupt K nodes.
Let S
K
be a family of all subsets of all n nodes of car-
dinality K. If subset S ∈ S
K
contains all transmitting
nodes of exactly x messages, we say that x messages
go through S. Let MAX
n,K
be a random variable de-
noting the number of messages corrupted by the ad-
versary if he controls K out of n nodes chosen in the
optimal way. Of course, the adversary does not know
the optimal subset of nodes to attack, but we wish to
check what would be adversary’s advantage with this
knowledge granted for free.
Theorem 4.2.
Pr
"
MAX
n,K
≥ Np +
1
3
log
n
K
N
1+
s
18Np
log
n
K
N
+ 1
!#
≤
1
N
.
In particular, for realistic settings and large (com-
pared to the number of devices) number N of sent
messages we get the following bound:
Corollary 4.2. For log
n
K
N
< N p following relation
holds: Pr
h
MAX
n,K
≥ N p+ 1.5
q
N log
n
K
N
p
i
≤
1
N
.
Proof. Due to space limitations we skip proofs.
Practical meaning of this bound is that the advan-
tage of the adversary given the possibility to choose
nodes after transmission is not significantly greater
than if the adversary would choose nodes at ran-
dom. Indeed, in general for fixed n,K,l we have
MAX
n,K
= N · p+ o(N) w.h.p.
5 CONCLUSIONS
The main proposal of this paper is to couple security
mechanisms for security related application of sen-
sor networks (or just networks with confidential in-
formation) with mechanisms that are based on phys-
ical difficulty to find devices located at random. We
believe that from practical point of view this is a cru-
cial mechanism and it can/should be exploited when
constructing communication protocols in some spe-
cific networks (like military networks). The protocol
presented is just an example of such an approach.
REFERENCES
Chan, H. and Perrig, A. (2005). Pike: Peer intermediaries
for key establishment in sensor networks. In The 24th
Conference of the IEEE Communications Society (In-
focom 2005).
Cicho´n, J., Grza´slewicz, J., and Kutyłowski, M. (2009).
Key levels and securing key predistribution against
node captures. In Dolev, S., editor, ALGOSENSORS,
volume 5804 of Lecture Notes in Computer Science,
pages 64–75. Springer.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J.,
and Khalili, A. (2005). A pairwise key predistribution
scheme for wireless sensor networks. ACM Trans. Inf.
Syst. Secur., 8(2):228–258.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In CCS ’02: Proceedings of the 9th ACM conference
on Computer and communications security, pages 41–
47, New York, NY, USA. ACM Press.
Iwanik, J., Klonowski, M., and Kutyłowski, M. (2004).
Duo–onions and hydra–onions – failure and adver-
sary resistant onion protocols. In Proceedings of
the IFIP TC-6 TC-11 Conference on Communica-
tions and Multimedia Security 2004. Springer Boston,
Springer Boston.
Klonowski, M., Kutyłowski, M., Ren, M., and Rybarczyk,
K. (2007). Forward-secure key evolution in wireless
sensor networks. In Bao, F., Ling, S., Okamoto, T.,
Wang, H., and Xing, C., editors, CANS, volume 4856
of Lecture Notes in Computer Science, pages 102–
120. Springer.
Ren, M., Das, T. K., and Zhou, J. (2006). Diverging keys in
wireless sensor networks. In Katsikas, S. K., Lopez,
J., Backes, M., Gritzalis, S., and Preneel, B., editors,
ISC, volume 4176 of Lecture Notes in Computer Sci-
ence, pages 257–269. Springer.
Rivest, R. (1998). Chaffing and winnowing: Confidentiality
without encryption.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
SECRYPT 2011 - International Conference on Security and Cryptography
390