A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks

무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜

  • 정윤수 (충북대학교 컴퓨터과학과) ;
  • 황윤철 (충북대학교 컴퓨터과학과) ;
  • 이건명 (충북대학교 전기전자컴퓨터공학부) ;
  • 이상호 (충북대학교 전기전자컴퓨터공학부)
  • Published : 2006.04.01

Abstract

To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

안전한 무선 센서 네트워크 환경의 구축을 위하여 노드 간에 전송되는 메시지를 암호화하고 인증하는 것이 중요하다. 그러나 자원의 제약성 때문에 일반 네트워크에서 사용하는 Diffie-Hellman이나 공개키 기반 키 협의 방법은 적합하지 않다. 최근 활발히 연구가 진행되고 있는 사전 키 분배 방법은 q-composite 랜덤 키 사전 분배 방법을 사용하여 확률적으로 키를 분배하지만 센서 노드간의 공유키가 존재하지 않을 가능성이 매우 높고, 공유키를 발견하는데 시간과 에너지가 많이 소요되어 무선 네트워크 환경에 적합하지 않다. 이 논문에서는 확률적 키에 의존하지 않는 클러스터 기반의 새로운 키 관리 프로토콜을 제안한다. 제안 프로토콜은 부트스트랩(bootstrap) 동안 사전 배치 전에 센서간 공유하고 있는 공통키 사용을 통하여 센서의 키 전송/수용과정을 제거하였기 때문에 키 관리 효율성이 높다. 또한 네트워크상에 존재하는 타협된 노드들을 안전하게 탐지할 수 있도록 lightweight 침입탐지 메커니즘 기능을 적용함으로써 안전성 문제를 해결한다.

Keywords

References

  1. M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002 http://www.sensorsmag.comiarticles/0402/40/main/shtml
  2. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, 'Energy Efficient Communication protocol for Wireless Microsensor Networks,' Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. 2000
  3. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002 https://doi.org/10.1109/MCOM.2002.1024422
  4. J. M. Kahn, R. H. Katz, and K. S. J. Pister, 'Next century challenges: Mobile networking for smart dust,' in Proceedings of the 5th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), 1999, pp. 483-492 https://doi.org/10.1145/313451.313558
  5. W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976 https://doi.org/10.1109/TIT.1976.1055638
  6. A. Perrig, R: Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'Spins: Security protocols 'for sensor networks,' in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199 https://doi.org/10.1145/381677.381696
  7. W. Fumy and P. Landrock, 'Principles of key management,' IEEE Journal of Selected Areas in Communications, vol. 11, pp. 785-793, June 1993 https://doi.org/10.1109/49.223881
  8. T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc) 2004
  9. B. C. Neuman and T. Tso, 'Kerberos: An authentication service for computer networks,' IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994 https://doi.org/10.1109/35.312841
  10. R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
  11. L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 18-22, 2002, pp. 41-47 https://doi.org/10.1145/586110.586117
  12. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti 'Secure pebblenets,' In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, 2001, pp. 156-163 https://doi.org/10.1145/501436.501438
  13. 김복순, 조기환, 이행곤, 박병연, '센서 네트워크에서 랜덤 키 체인을 활용한 단대단 키 협의 방안', 한국통신학회 추계종합 학술발표논문집, 28, 2003. pp. 1-12
  14. H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, May, 2003, pp. 197-213
  15. L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, Nov. 2002, pp. 41-47 https://doi.org/10.1145/586110.586117
  16. S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
  17. Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks' In the proc. of l0th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, Feb. 2003 https://doi.org/10.1109/ICTEL.2003.1191669
  18. M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in CryptologyCRYPTO'89, pp. 324-334, 1989, LNCS Volume 435, Springer-verlag
  19. A. Khalili, et al., 'Toward Secure key Distribution in Truly Ad-Hoc Networks,' IEEE SAINT'03, pp. 342-346, Jan. 2003
  20. D. Boneh, et al., 'Identity-based Encryption from the Weil Pairing,' CRYPTO 2001, vol. 2139, pp. 213-229, Aug. 2001
  21. I. zHOU, ET AL., 'Securing Ad Hoc Networks,' IEEE Network Magazine, 13(6), Nov./Dec. 1999 https://doi.org/10.1109/65.806983
  22. L. Venkatraman et al., 'A Novel Authentication Schemes Ad Hoc Networks,' IEEE WCNC' 2000, vol.3, pp. 1268-1273, 2000 https://doi.org/10.1109/WCNC.2000.904814
  23. C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, 'On key distrubution and authentication in mobile radio networks,' Advances in Cryptology - euroCrypt'93, pp. 461-465, 1993, INCS Volume 765, Springer-verlag
  24. D. Carman, P. Kruus, and B. Matt, 'Constraints and approaches for distributed sensor network security,' Tech. Rep. 00-010, NAI Labs, September 2000. http://download.nai.com/produets/media/nai/zip/nailabs-report-00-010-final.zip
  25. Network simulator. Available in http://www.isi.edu/nsnam/ns, January 2003