DOI QR코드

DOI QR Code

An Authentication Scheme for Filtering Injected Bogus Data in Sensor Networks

센서 네트워크 내의 위조된 데이터 삽입 공격 방지를 위한 인증 방법

  • 조관태 (고려대학교 정보경영공학전문대학원) ;
  • 김용호 (고려대학교 정보경영공학전문대학원) ;
  • 이동훈 (고려대학교 정보경영공학전문대학원)
  • Published : 2007.08.31

Abstract

Recently, a location-based threshold-endorsement(LTE) scheme is proposed to thwart bogus data injection attacks. The scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has fatal vulnerabilities. We also propose an improved scheme that mitigates the weakness and thereby achieves the original claims without lessening remarkable filtering power intended in LTE.

위조된 데이터를 센서 네트워크 내에 삽입하기 위한 공격을 방지하기 위해 센서 노트의 위치 기반 임계값 보증(LTE) 방법이 최근에 제안되었다. 제안된 방법은 이전에 제안된 대칭키 기반 방법보다 필터링 능력이 더 뛰어나며 에너지 절약 측면에 있어서도 더 효율적이다. 본 논문에서는 LTE 방법이 지닌 치명적인 취약성을 증명하고 취약성을 완화시킴과 동시에 LTE 방법이 의도했던 데이터 필터링 능력을 그대로 유지한 채, 본래 이루고자했던 목적에 더 근접한 결과를 보여줄 수 있는 향상된 방법을 제시할 것이다.

Keywords

References

  1. K. Barr and K. Asanovic, 'Energy aware lossless data compression,' pp.231-244, 1st Int. Conf.Mobile Syst., Applicat., Services, May 2003 https://doi.org/10.1145/1066116.1066123
  2. D. Boneh, B. Lynn, and H. Shacham, 'Short signatures from the Weil pairing,' pp.514-532, in Proc, Asiacrypt' 01, Lecture Notes in Computer Science, vol. 2248, Dec. 2001 https://doi.org/10.1007/3-540-45682-1_30
  3. H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' pp.197-213, IEEE Symposium on Security and Privacy, May 2003
  4. 'Digital Hash Standard,' federal information processing standards publication 180-1, Apr. 1995
  5. W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' pp.586-597, IEEE INFOCOM 04, Mar. 2004 https://doi.org/10.1109/INFCOM.2004.1354530
  6. W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' pp. 228-258, ACM Transactions on Information and System Security, Aug. 2005 https://doi.org/10.1145/1065545.1065548
  7. L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' pp.41-47. 2002, ACM CCS 02, Nov. 2002 https://doi.org/10.1145/586110.586117
  8. G. Gaubatz, J. Kaps, and B. Sunar, 'Public keys cryptography in sensor networks?revisited', pp.2-18, ESAS 04, Aug. 2004
  9. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUS,' pp.119-132, CHES 04, Lecture Notes in Computer Science, vol. 3156, Aug. 2004
  10. D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' pp.41-77, ACM Transactions on Information and System Security, Feb. 2005 https://doi.org/10.1145/1053283.1053287
  11. D. J. Malan, M. Welsh, and M. D. Smith, 'A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,' pp.71-80, IEEE SECON 04, Oct. 2004 https://doi.org/10.1109/SAHCN.2004.1381904
  12. A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' pp. 189-199, ACM/IEEE Intemation Conference on Mobile Computing and Networking, Jul. 200l https://doi.org/10.1145/381677.381696
  13. A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, 'Energy analysis for public-key cryptography for wireless sensor networks,' IEEE PERCOM 05, Mar. 2005 https://doi.org/10.1109/PERCOM.2005.18
  14. R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, 'Tinypk: Securing sensor networks with public key technology,' pp.59-64, ACM SASN 04, Oct. 2004 https://doi.org/10.1145/1029102.1029113
  15. F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' vol.23, no.4, pp.839-850, IEEE JSAC, Special Issue on Self-Orgazing Distributed Collaborative Sensor Networks, Apr. 2005 https://doi.org/10.1109/JSAC.2005.843561
  16. Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Securing sensor networks with location-based keys,' pp.1909-1914, IEEE WCNC 05, Mar. 2005 https://doi.org/10.1109/WCNC.2005.1424811
  17. Y. Zhang, W. Liu, W. Lou, and Y. Fang, 'Location-based compromise-tolerant security mechanisms for wireless sensor networks,', vo1.24, no.2, pp.247-260, IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, Feb. 2006 https://doi.org/10.1109/JSAC.2005.861382
  18. Y. Zhang, W. Liu, W. Lou, Y. Fang, and D. Wu, 'Secure localization and authentication in ultra-wideband sensor networks,' vol.24, no.4, pp.829-835, IEEE JSAC, Special Issue on UWB Wireless Communications - Theory and Applications, Apr. 2006 https://doi.org/10.1109/JSAC.2005.863855
  19. S. Zhu, S. Setia, S. Jajodia, and P. Ning, 'An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,' pp.259-271, Proc. IEEE Symp. Security Privacy, May 2004 https://doi.org/10.1109/SECPRI.2004.1301328

Cited by

  1. Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 vol.17C, pp.1, 2010, https://doi.org/10.3745/KIPSTC.2010.17C.1.001