DOI QR코드

DOI QR Code

A Secure Data Transmission Mechanism for Sensor Network Communication

센서네트워크 통신을 위한 안전한 데이터 전송 기법

  • 도인실 (이화여자대학교 컴퓨터학과) ;
  • 채기준 (이화여자대학교 컴퓨터학과)
  • Published : 2007.08.31

Abstract

For reliable sensor network communication, secure data transmission mechanisms are necessary. In our work, for secure communication, we cluster the network field in hexagonal shape and deploy nodes according to Gaussian distribution. After node deployment, clusterheads and gateway nodes in each cluster play the role of aggregating and delivering the sensed data with suity information all the way to the base station. Our mechanism decreases the overhead and provides food performance. It also has resilience against various routing attacks.

효율적인 센서 네트워크 통신이 가능하기 위해서는 보안을 제공하는 라우팅 메커니즘이 필수적이다. 본 연구에서는 안전한 데이터 통신이 가능하도록 하기위해 센서 네트워크 필드를 육각형의 클러스터로 사전에 나누고 가우시안 분포에 따라 각 클러스터에 노드를 배치한 다음 각 클러스터의 클러스터헤드와 게이트웨이 노드를 통해 센서 노드가 감지한 정보를 클러스터헤드론 통해 모아서 보안 정보와 함께 베이스 스테이션에 전달하는 메커니즘을 제안한다. 제안 메커니즘은 전체적인 오버헤드를 효과적으로 줄이면서 효율성을 보장할 뿐 아니라 다양한 라우팅 공격에 대한 저항성을 갖는다.

Keywords

References

  1. D. W. Carman, P. S. Kruus, and B. J. Matt, 'Constraints and approaches for distributed sensor network security,' Technical report, NAI Labs, 2000
  2. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' In Proceedings of the IEEE International Conference on Network Protocols(ICNP), Nov. 2002
  3. M. G. Zapata and N. Asokan, 'Securing ad hoc routing protocols,' In Proceedings of ACM Workshop on Wireless Security (WiSe), ACM Press, 2002 https://doi.org/10.1145/570681.570682
  4. Y-C. Hu, D. B. Johnson, and A. Perrig, 'Secure efficient distance vector routing in mobile wireless ad-hoc networks,' In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Jun. 2002 https://doi.org/10.1109/MCSA.2002.1017480
  5. Y.-C Hu, A. Perrig, and D. B. Johnson, 'Ariadne: a secure on-demand routing protocol for ad hoc networks,' In Proceedings of the 8th Annual International Conference on Mobile computing and Networking, Sep. 2002 https://doi.org/10.1145/570645.570648
  6. P. Papadimitratos and Z. Haas, 'Secure routing for mobile ad hoc networks,' In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002
  7. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' In Proceedings of 7th Annual International Conference on Mobile Computing and Networks MOBICOM 2001, Jul. 2001 https://doi.org/10.1145/381677.381696
  8. C. Karlof, N. Sastry, and D. Wagner, 'Tinyflec: a link layer security architecture for wireless sensor networks,' In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04), 2004 https://doi.org/10.1145/1031495.1031515
  9. J. Deng, R. Han, and S. Mishra, 'A performance evaluation of intrusion-tolerant routing in wireless sensor networks,' In Proceedings IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN '03), Apr. 2003
  10. G. G. Finn, 'Routing and addressing problems In large metropolitan-scale internetworks,' Technical Report ISI/RR-87-180, lSI, Mar. 1987
  11. B. Blum, T. He, S. Son, and J. Stankovic, 'IGF: A state-free robust communication protocol for wireless sensor networks,' Technical Report CS-2003-11, Univ. of Virginia, Charlottesville, VA, 2003
  12. B. Karp and H. T. Kung, 'GPSR: Greedy perimeter stateless routing for wireless networks,' In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), Aug. 2000 https://doi.org/10.1145/345910.345953
  13. Y-J. Kim, R. Govindan, B. Karp, and S. Shenker, 'Geographic routing made practical,' In Proceedings of USENIX Symposium on Networked Systems Design and Implementation, May 2005
  14. Z. J. Haas, M. R. Pearlm, and P. Samar, 'The Zone Routing Protocol (ZRP) for ad hoc networks,' IETF MANET Internet Draft, Jul. 2002
  15. Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He, 'SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks,' In Proceedings of the SASN'06, Oct. 30, 2006 https://doi.org/10.1145/1180345.1180351
  16. 도인실, 채기준, 김호원, '배치정보를 이용한 클러스터 기반 센서 네트워크 키 설정 메커니즘,' 한국정보처리학회논문지 13-C권 제2호, 2006년 4월 https://doi.org/10.3745/KIPSTC.2006.13C.2.195
  17. 'The Network Simulator: ns-2,' Available at: http://www.isi.edu/nsnam/ns [Last accessed; Jun 26, 2007.]
  18. C. Karlof and D. Wagner, 'Secure routing in wireless sensor networks: Attacks and countermeasures,' Elsevier's Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Sep. 2003
  19. Z. Yu and Y. Guan, 'A Robust Group based Key Management Scheme for Wireless Sensor Networks,' IEEE Communications Society, WCNC 2005 https://doi.org/10.1109/WCNC.2005.1424812
  20. IEEE 802.15.4 - 2003 IEEE Standard for Information Technology-Part 15.4: Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANS), 2003
  21. F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks,' In Proceedings of IEEE INFOCOM 2004