DOI QR코드

DOI QR Code

An Improved Protocol for Establishing A Session Key in Sensor Networks

센서 네트워크의 노드간 세션키 생성을 위한 개선된 프로토콜

  • Published : 2006.04.01

Abstract

Because the traditional public key-based cryptosystems are unsuitable for the sensor node with limited computational and communication capability, a secure communication between two neighbor sensor nodes becomes an important challenging research in sensor network security. Therefore several session key establishment protocols have been proposed for that purpose. In this paper, we analyzed and compared the existing session key establishment protocols based on the criterions of generation strategy and uniqueness of the session key, connectivity, overhead of communication and computation, and vulnerability to attacks. Based on the analysis results, we specify the requirements for the secure and efficient protocols for establishing session keys. Then, we propose an advanced protocol to satisfy the specified requirements and verify the superiority of our protocol over the existing protocols through the detailed analysis.

제한된 연산 및 통신 능력을 갖는 센서 노드에서는 전통적인 공개키 기반의 보안 기법들을 사용할 수 없으므로, 두 센서 노드 사이의 안전한 통신이 센서 네트워크의 중요한 연구 과제가 되었으며 두 센서 노드 사이의 안전한 직접 통신을 위한 다양한 세션키 설정 프로토콜들이 제안되었다. 본 연구에서는 기존의 대표적인 세션키 설정 프로토콜들을 세션키 설정 방법, 세션키의 유일성, 연결성, 통신 및 연산 과부하, 공격 취약성 등의 기준 측도에 의해 분석하고, 분석 결과를 토대로 안전하고 효율적인 프로토콜을 위한 기준안을 제시하였다. 또한, 제시된 기준안을 만족시키는 개선된 세션키 생성 프로토콜을 제안하고, 제안 프로토콜의 성능적 우수성을 상세한 분석을 통해 제시하였다.

Keywords

References

  1. A. Perrig, J. Stankovic and D. Wagner, 'Security in Wireless Sensor Networks,' Communications of the ACM, Vol.47, No.6, pp.53-57, 2004 https://doi.org/10.1145/990680.990707
  2. N. H, R. Smith, and P. Bradford, 'Security for Fixed Sensor Networks,' Proc. of ACMSE'04, pp.212-213, 2004 https://doi.org/10.1145/986537.986586
  3. Y. Wang, 'Robust Key Establishment in Sensor Networks,' SIGMOD Record, Vol.33, No.1, pp.14-19, 2004 https://doi.org/10.1145/974121.974124
  4. A. Perrig, R. Szewczyk and D. Cooler, 'SPINS: Security Protocols for Sensor Networks,' Journal of Wireless Nets., Vol.8, No.5, pp.521-534, 2002 https://doi.org/10.1023/A:1016598314198
  5. B. Lai, D. Hwang, S. Kim and I. Verbauwhede, 'Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor networks,' Poc. of ISLPED'04, pp.351-356, 2004 https://doi.org/10.1109/LPE.2004.1349365
  6. Eschenhaur and V. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks,' Proc. of CCS'02, pp.41-47, 2002 https://doi.org/10.1145/586110.586117
  7. H. Chan, A. Perrig and D. Song, 'Random Key Predi- stribution Schemes for Sensor Networks, Proc. of 2003 IEEE Symposium on Security and Privacy(SP'03), pp.197-213, 2003
  8. R. Pietro, L. Mancini and A. Mei, 'Random Key-Assignment for Secure Wireless Sensor Networks,' Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp.62-71, 2003 https://doi.org/10.1145/986858.986868
  9. R. Blom, 'An Optimal class of symmetric key generation systems,' Proc. of EUROCRYPT84, Lecture Notes in Computer Science, Springer-Verlag 209, pp.335-338, 1984
  10. W. Du, J. Deng and J Katz, 'A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks, Proc. of CCS'03, pp.27-31, 2003
  11. D. Liu and P. Ning, 'Location-based Pairwise Key Establishments for Static Sensor Networks,' Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp.72-82, 2003 https://doi.org/10.1145/986858.986869
  12. W. Du, J. Deng, and S. Chen, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' Proc. of the IEEE INFOCOM'04, pp.586-597, 2004 https://doi.org/10.1109/INFCOM.2004.1354530