A Periodical Key Refreshment Scheme for Compromise-prone Sensor Nodes

오염에 취약한 센서노드들을 위한 주기적인 키갱신 방안

  • Wang, Gi-Cheol (Center for Advanced Image and Information Technology, Chonbuk National University) ;
  • Kim, Ki-Young (Division of Information Security Research, ETRI) ;
  • Park, Won-Ju (Division of Information Security Research, ETRI) ;
  • Cho, Gi-Hwan (Division of Electronics and Information Engineering, Chonbuk National University)
  • 왕기철 (전북대학교 영상정보신기술 연구소) ;
  • 김기영 (한국전자통신연구원 정보보호연구단 임베디드보안기술연구팀) ;
  • 박원주 (한국전자통신연구원 정보보호연구단 임베디드보안기술연구팀) ;
  • 조기환 (전북대학교 전자정보공학부)
  • Published : 2007.11.25

Abstract

In sensor networks, it is very important to refresh communication keys of sensors in a periodic or on-demand manner. To perform a dynamic key management efficiently, sensor networks usually employ cluster architecture and each CH (Cluster Head) is responsible for key management within its cluster. In cluster-based sensor networks, CHs are likely to be targets of capture attacks, and capture of CHs threatens the survival of network significantly. In this paper, we propose a periodical key refreshment scheme which counteracts against capture of CHs. First, the proposed scheme reduces the threat caused by compromise of CHs by forcing each CH to manage a small number of sensors and changing CH role nodes periodically. Second, the proposed scheme flings attackers into confusion by involving other nodes in a key establishment between BS (Base Station) and a CH. Our numerical analyses showed that the proposed scheme is more secure than other schemes and robust against compromise of CHs.

센서 네트워크에서 센서 들의 통신키를 주기적으로 혹은 필요에 의해 갱신하는 것은 매우 중요한 문제이다. 동적인 키관리의 효율성을 기하기 위해, 센서 네트워크는 클러스터 구조를 도입하고 각 CH(Cluster Head)가 클러스터 내의 키를 관리하도록 한다. 그러나, 이러한 클러스터 기반 센서 네트워크에서 CH는 공격의 목표가 되기 쉽고, CH들의 오염은 네트워크 전체에 큰 위협을 가져온다. 본 논문에서, 우리는 CH들의 오염에 강건한 주기적인 키 갱신 방안을 제안하였다. 먼저, 제안방법은 CH가 관리하는 센서들의 수를 줄이고 CH들이 주기적으로 변경되게 함으로써, CH의 오염에 따른 영향을 최소화 한다. 둘째, 제안방법은 임의의 CH와 BS(Base Station)간의 키 설정에 다른 센서노드들을 참가시켜 공격자들을 혼란에 빠뜨린다. 우리는 수치적인 분석을 통해 제안방법이 다른 키 관리 방법들에 비해 안전하고 CH들의 오염에 강건함을 증명하였다.

Keywords

References

  1. H. Chan, A. Perrig, and D. Song, 'Random Key Predistribution Schemes for Distributed Sensor Networks,' in Proc. of IEEE Symp. Security and Privacy, May. 2003
  2. P. Traynor et al., 'Establishing Pair-wise Keys in Heterogeneous Sensor Networks,' in Proc. of IEEE Infocom '06, 2006
  3. W. Du et al., 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' in Proc. of IEEE Infocom '04, Mar. 2004
  4. D. Liu, P. Ning, and W. Du, 'Group-Based Key Pre-Disribution in Wireless Sensor Networks,' in Proc. of 2005 ACM Wksp. Wireless Security(WiSe 2005), pp. 11-20, Sep. 2005
  5. S. Zhu, S. Setia, and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' in Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003
  6. L. Eschenauer and V. D. Gilgor, 'A Key Management Scheme for Distributed Sensor Networks,' in Proc. of 9th ACM Conf. Comp. and Comm. Sec., pp. 41-47, Nov. 2002
  7. W. Gu et al., in Proc. of 14th IEEE Wksp on Quality of Service(IWQoS 2006), pp. 189-198, Jun. 2006
  8. M. Eltoweissy, M. Moharrum, and R. Mukkamala, 'Dynamic Key Management in Sensor Networks,' IEEE Communications Magazine, vol. 44, issue 4, pp. 122-130, Apr. 2006
  9. G. Jolly et al., 'A Low-Energy Key Management Protocol for Wireless Sensor Networks,' in Proc. IEEE Int'l Symp. Comp. and Comm. (ISCC '03), pp. 335-340, Jun. 2003
  10. M. Eltoweissy et al., 'Combinatorial Optimization of Group Key Management,' Journal of Network and Systems Management, vol. 12, no. 1, pp. 33-44, Mar. 2004 https://doi.org/10.1023/B:JONS.0000015697.38671.ec
  11. M. Eltoweissy et al., 'Group Key Management Scheme for Large-Scale Sensor Networks,' Ad Hoc Networks, vol .3, issue 5, pp. 668-688, Sep. 2005 https://doi.org/10.1016/j.adhoc.2004.08.012
  12. A. Perrig et al., 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002 https://doi.org/10.1023/A:1016598314198
  13. M. Younis, K. Ghumman, and M. Eltoweissy, 'Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks,' IEEE Tans. on Parallel and Distributed Systems, vol. 17, no. 8, pp. 865-882, Aug. 2006 https://doi.org/10.1109/TPDS.2006.106
  14. D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks,' in Proc. of the 10th ACM Conference on Computer and Communications Security(CCS '03), pp. 52-61, 2003
  15. O. Younis and S. Fahmy, 'HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks,' IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 366-379, Oct.-Dec. 2004 https://doi.org/10.1109/TMC.2004.41
  16. W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, 'An Application-Specific Protocol Architecture for Wireless Microsensor Networks,' IEEE Trans. on Wireless Communications, vol. 1, no. 4, pp. 660-670, Oct. 2002 https://doi.org/10.1109/TWC.2002.804190
  17. G. Gupta and M. Younis, 'Performance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks,' in Proc. Int'l Conf. Telecomm. (ICT '03), pp. 1577-1583, Mar. 2003
  18. G. Wang and G. Cho, 'Pairwise Key Establishments without Key Pre-distribution for Mobile Ad hoc Network Environment,' IEE Proceedings Communications, vol. 153, no. 6, pp. 822-827, Dec. 2006 https://doi.org/10.1049/ip-com:20050540