DOI QR코드

DOI QR Code

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network

WSN에서의 효율적 통신을 위한 인증서 폐지 목록 표현 기법

  • 맹영재 (인하대학교 정보통신대학원) ;
  • 아지즈 (인하대학교 정보통신대학원) ;
  • 이경희 (수원대학교 전기공학) ;
  • 양대헌 (인하대학교 정보통신대학원)
  • Published : 2007.12.31

Abstract

In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys' identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.

WSN의 보안 알고리즘은 센서노드의 제한된 자원을 근거로 비교적 적은 연산과 적은 메모리를 필요로 하는 대칭키를 이용하여 주로 연구되어 왔다. 하지만 공개키와 관련한 최근의 연구들은 실제 측정을 통해 센서노드가 가진 적은 자원으로도 공개키가 사용 가능하다는 것을 보였으며 WSN에서 공개키의 사용을 가정한다면 자원 절약적인 키 관리 방법이 필요하다. 이 논문에서는 공개키의 중요한 키 관리 작업 중 하나인 인증서 폐지를 위한 두 가지 효율적인 인증서 폐지 목록 표현 기법을 소개한다. 첫 번째는 broadcast encryption에서 사용되는 CS(Complete Subtree)를 이용하는 기법이고 두 번째는 인증서의 유효성을 이진벡터로 표현한 새로운 기법인 BVS(Bit Vector Scheme)이다. BVS 및 CS를 이용하여 통신 오버헤드를 얼마나 줄일 수 있는지 보이고 관련된 방법들의 비교로 결론을 내린다.

Keywords

References

  1. Eschenauer, L., Gligor, V. D.: A key management scheme for distributed sensor networks, In Proc. of the ninth ACM CCS'02, pp.41-47, 2003 https://doi.org/10.1145/586110.586117
  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, IEEE Symp on S&P, pp.197-213, May 2003
  3. Du, W., Deng, J., Han, Y. S., and Varshney, P.: A pair-wise key pre-distribution scheme for wireless sensor networks, ACM CCS'03, pp.42-51, 2003 https://doi.org/10.1145/948109.948118
  4. Liu, D., Ning, P.: Establishing Pair-wise keys in distributed sensor networks, ACM CCS'03, pp.52-61, 2003 https://doi.org/10.1145/948109.948119
  5. Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems, Com. of the ACM, 21(2): pp.120-126, 1978 https://doi.org/10.1145/359340.359342
  6. Gura N., Patel A., Wander A., Eberle A., Shantz S. C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES pp.119-132, 2004
  7. Wander A., Gura N., Eberle H., Gupta V., Shantz S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, PerCom'05, pp.324-328 https://doi.org/10.1109/PERCOM.2005.18
  8. Watro R.J., Kong D., Cuti S.F., Gardiner Ch., Lynn Ch., Kruus P.: TinyPK: securing sensor networks with public key technology, SASN'04, 59-64, pp.10-2004 https://doi.org/10.1145/1029102.1029113
  9. Malan D.J., Welsh A., Smith M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Crypt., IEEE SECON'04, pp.71-80 https://doi.org/10.1109/SAHCN.2004.1381904
  10. Du W., Wang R., and Ning P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. Proc. of The sixth ACM MobiHoc, pp.58-67 https://doi.org/10.1145/1062689.1062698
  11. Pottie G. J. and Kaiser W. J. Wireless integrated network sensors. Communications of the ACM, pp. 51-58, May 2000 https://doi.org/10.1145/332833.332838
  12. Nyang D., Mohaisen A.: Cooperative Public Key Authentication Scheme for Wireless Sensor Networks, To appear in proceeding of UIC06, LNCS, Sep 2006
  13. Naor D., Naor M., Lotspiech J.: Revocation and Tracing Schemes for Stateless Receivers. CRYPTO : pp.41-62, 2001 https://doi.org/10.1007/3-540-44647-8_3
  14. Fiat A., Naor M.: Broadcast Encryption. CRYPTO : pp.480-491, 1993
  15. Koblitz N., Menezes A., Vanstone S.: The State of Elliptic Curve Cryptography, Designs, Codes and Cryptography, 19, 173-193, 2000 https://doi.org/10.1023/A:1008354106356