An Hierarchical Key Management Scheme for Assure Data Integrity in Wireless Sensor Network

WSN에서 데이터 무결성을 보장하는 계층적인 키 관리 기법

  • 정윤수 (충북대학교 전자계산학과 네트워크보안 연구실) ;
  • 황윤철 (충북대학교 전자계산학과 네트워크보안 연구실) ;
  • 이상호 (충북대학교 전기전자컴퓨터공학부 컴퓨터공학)
  • Published : 2008.03.31

Abstract

A main application of sensor networks are to monitor and to send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power from each sensor, intermediate network nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate network nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. From simulation study, we compare the amount of the energy consumption overhead, the time of key transmission and the ratio of of key process between the proposed method and LHA-SP. The simulation result of proposed protocol is low 3.5% a lord of energy consumption than LHA-SP, the time of key transmission and the ration of key process is get improved result of each 0.3% and 0.6% than LHA-SP.

센서 네트워크의 주요 애플리케이션은 저 전력 센서 장치로 이루처진 무선 네트워크를 이용하여 악의적인 환경을 감시하고 이에 대한 정보를 유선 네트워크와 연결된 기지국으로 전송한다. 이 과정에서 개별 센서노드의 전력을 보존하기 위해서는 중간 네트워크 노드가 개별 센서로부터 전송되는 결과를 수집해야 한다. 그러나 이런 방법은 위태롭게 된 단일 센서 노드가 전체 센서 네트워크를 무용지물로 만들거나 더 심하게는 운영자로 하여금 잘못된 판독을 신뢰하게 만들 위험을 야기한다. 이 논문에서는 무선 네트워크 환경에서 중간 노드가 안전하게 데이터를 수집하면서 악의적인 센서를 해당 네트워크로부터 안전하게 제거하기 위한 프로토콜을 제안한다. 제안 프로토콜은 안전한 세션이 센서 노드와 게이트웨이 사이에서만 성립하는 다중 네트워크 구조에 유용하며 시뮬레이션을 통해 기존 LHA-SP 기법과 비교 분석한 결과 제안 기법이 LHA-SP 기법보다 키 관리로 인해 발생된 에너지 소비 부하가 3.5% 낮았으며, 키 전달 시간 및 처리 시간은 LHA-SP 기법보다 각각 0.3%와 0.6% 개선된 결과를 얻을 수 있었다.

Keywords

References

  1. W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE, 2004
  2. I. F. Akyldiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks:a survey, Computer Networks, 38:393-422, December. 2002 https://doi.org/10.1016/S1389-1286(01)00302-4
  3. F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons Ltd, 2002
  4. M. Eltoweissy, H. Heydari, L. Morales, and H. Sudborough, Combinatorial Optimization for Key Management in Secure Multicast Environments, Journal of Network and Ssytem Management, Kluwer Publishing, 2004
  5. A-S. K. Pathan, H. W. Lee, C. S. Hong, Security in Wireless Sensor Networks: Issues and Challenges, ICACT 2006, vol.2, pp.1043-1048, Feb, 2006
  6. A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, SPINS : Security Protocols for Sensor Networks, Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001
  7. L. Zhou, and Z. J. Haas, Securing ad hoc networks, IEEE Network, Vol.13, Issue 6, pp. 24-30, Nov.-Dec. 1999
  8. B. Strulo, J. Farr, and A. Smith, Securing Mobile Ad hoc Networks -A Motivational Approach, BT Technology Journal, Vol.21, Issue 3, pp. 81-89, 2003 https://doi.org/10.1023/A:1025111232045
  9. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in Mobile Ad Hoc Networks: Challenges and Solutions, IEEE Wireless Communications, Vol.11, Issue 1, pp.38-47, Feb. 2004
  10. K. Wu, C. Liu, V. King, Very low cost sensor localization for hostile environments, ICC 2005, Vol.5, pp.3197-3201, 16-20 May, 2005
  11. T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) 2004
  12. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy efficient communication protocol for wireless microsensor networks, IEEE Proceedings of the Hawaii International conference on System Sciences, pp.1-10, January 2000
  13. H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, pp.197-213, May, 2003
  14. L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, pp.41-47, Nov. 2002
  15. H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for Sensor networks," In IEEE Symposium on Research in Security and Privacy, pp.197-213, May, 2003
  16. S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
  17. Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks,' In the proc. of 10th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, pp. 1577-1583, Feb. 2003
  18. M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in Cryptology -CRYPTO'89, pp.324-334, 1989, INCS Vol. 435, Springer-verlag
  19. A. Aimbola, S. Qi and M. Merabti, 'Nethostsensor: a novel concept in intrusion detection systems,' Proceedings. Eighth IEEE International Symposium on Computers and Communication, 2003(ISCC 2003), pp.232-237, 2003
  20. Xiao Chen, Jawad Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Network,' Mobile Adhoc and Sensor Systems Conference 2005 IEEE International Confercence, pp. 6, Nov. 2005
  21. L. B. Oliveira, H. C. Wang, A. A. Loureiro, 'LHA-SP:secure protocols for hierarchical wireless sensor networks,' In 9th IFIP/IEEE International Symposium on Integrated Network Management, pp. 31-44, 15-19. May. 2005
  22. F. Yea, H. Luo, S. Lu, and L. Zhang, 'Statistical en-route filtering of injected false data in sensor networks,' Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies in INFOCOM 2004, pp.2446-2457, March. 2004
  23. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, 'System architecture directions for networked sensors,' In ACM 9th ASPLOS'03, pp. 93-104, 2000
  24. A. Siraj, R. B. Vaughn, S. M. Bridges, 'Intrusion sensor data fusion in an intelligent intrusion detection system architecture,' Proceedings of the 37th Annual Hawaii International Conference on System Sciences, Jan, 2004