next up previous
Next: Design Guidelines Up: System Assumptions Previous: Communication Architecture

Full paper: Postscript, PS.GZ, PDF


Trust Requirements

Generally, the sensor networks may be deployed in untrusted locations. While it may be possible to guarantee the integrity of the each node through dedicated secure microcontrollers (e.g.[1] or [7]), we feel that such an architecture is too restrictive and does not generalize to the majority of sensor networks. Instead, we assume that individual sensors are untrusted. Our goal is to design the SPINSkey setup so a compromise of a node does not spread to other nodes.

Basic wireless communication is not secure. Because it is broadcast, any adversary can eavesdrop on the traffic, and inject new messages or replay and change old messages. Hence, SPINSdoes not place any trust assumptions on the communication infrastructure, except that messages are delivered to the destination with non-zero probability.

Since the base station is the gateway for the nodes to communicate with the outside world, compromising the base station can render the entire sensor network useless. Thus the base stations are a necessary part of our trusted computing base. Our trust setup reflects this and so all sensor nodes intimately trust the base station: at creation time, each node is given a master key which is shared with the base station. All other keys are derived from this key.

Finally, each node trusts itself. This assumption seems necessary to make any forward progress. In particular, we trust the local clock to be accurate, i.e.to have a small drift. This is necessary for the authenticated broadcast protocol we describe in Section 5.


next up previous
Next: Design Guidelines Up: System Assumptions Previous: Communication Architecture

Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001