DOI QR코드

DOI QR Code

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network

무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas

  • 김은경 (이화여자대학교 컴퓨터정보통신학과) ;
  • 서재원 (이화여자대학교 컴퓨터정보통신학과) ;
  • 채기준 (이화여자대학교 컴퓨터정보통신학과) ;
  • 최두호 (한국전자통신연구원 RFID/USN보안안연구팀) ;
  • 오경희 (한국전자통신연구원 RFID/USN보안안연구팀)
  • Published : 2008.10.31

Abstract

The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.

무선 센서 네트워크는 여러 가지 제약점을 가지고 있기 때문에 에너지 효율성과 보안성 제공은 중요한 이슈이다. 기존에 라우팅에 있어서 tree-based와 multipath-based라는 두 가지 접근법을 효과적으로 통합시킨 Tributaries and Deltas(TD)가 제안된 바가 있으며, 본 논문에서는 TD 구조에 계층성이 더해진 클러스터 기반의 TD를 제안하여 기존 TD보다 향상된 성능을 증명하였다. 클러스터 기반의 TD 구조는 두 가지 상황에서 기존의 TD보다 더 좋은 성능을 가짐을 보여 주었다. 하나는 베이스스테이션(BS)이 잘못된 정보를 받았다 판단하고 재전송을 요구할 때와, 또 다른 하나는 BS가 이동성을 가지고 있을 때이다. 또한 제안된 구조에 적합한 키 설립 메커니즘을 제안하여 에너지 효율성뿐만 아니라 보안성도 고려한 새로운 센서 네트워크 구조를 제안하였고 TinyOS 2.0을 기반으로 TmoteSKY 센서 보드에 구현하여 실제 네트워크에서의 응용 가능성을 입증하였다.

Keywords

References

  1. 김신효, 강유성, 정병호, 정교일, “u-센서 네트워크 보안 기술 동향”, 전자통신동향분석, 제20권 제1호, pp. 93-99, 2005. 2 https://doi.org/10.1109/MCOM.2005.1522124
  2. Amit Manjhi, Suman Nath, Phillip B. Gibbons, “Tributaries and Deltas : efficient and robust aggregation in sensor network streams”, SIGMOD 2005, pp.287-298, Jun. 2005 https://doi.org/10.1145/1066157.1066191
  3. Fei hu, Jason Tillett, Jim Ziobro, neeraj K. Sharma, “An Energy-efficient Approach to Securing Tree-zone-based Sensor Networks,” GLOBECOM 2003, vol 3, pp.1430-1434, Dec. 2003 https://doi.org/10.1109/GLOCOM.2003.1258474
  4. Jamil Ibriq, imad Mahgoub, “Cluster-based routing in wireless sensor networks : issues and challenges”, SPECTS 2004, pp.759-766, Jul. 2004
  5. J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000
  6. L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Conference on Computer and Communications Security 2002, pp.41-47, 2002 https://doi.org/10.1145/586110.586117
  7. Mahdi Lotfinezhad, Ben Liang, “Energy efficient clustering in sensor networks with mobile agents”, Wireless Communications and Networking Conference 2005, Vol.3, pp.1872-1877, Mar. 2005 https://doi.org/10.1109/WCNC.2005.1424797
  8. Seema Bandyopadhyay, Edward J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks”, INFOCOM 2003, Vol.3, pp.1713-1723, Mar. 2003
  9. Stefan Schmidt, Holger Krahn, Stefan Fischer, and Dietmar W¨atjen, “A Security Architecture for Mobile Wireless Sensor Networks,” European Workshop on Security in Ad-Hoc and Sensor Networks 2004, Aug. 2004
  10. Ruay-shiung Chang, Chia-jou Kuoan, “An Energy efficient routing mechanism for wireless sensor networks”, International conference on Advanced Information Networking and Applications(AINA) 2006, Vol.2 pp.308-312, Apr. 2006
  11. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” Conference on Computer and Communications Security 2003, pp.42-51, Oct. 2003 https://doi.org/10.1145/948109.948118
  12. J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000
  13. R. Blom “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT 84, LNCS 209, pp.335–338, Apr. 1985
  14. ITU-T Draft Document,"Draft Recommendation Y.2012 (formally Y.NGN-FRA)[Draft Version0.8]," Geneva, 17-28 July 2006
  15. ITU-T Draft Document, "Draft Recommendation Y.RACF (Y.2111) Release2 (Version 0.4.0)," Beijing, 10-21 September 2007
  16. ETSI TISPAN NGN Document, ETSI TS 183 017: "Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control: DIAMETER protocol for session based policy set up information exchange between the Application Function (AF) and the Service Policy Decision Function (SPDF);Protocol specification", in WG 3
  17. 이동규, 송성한, 김양중, 정일영, "NGN 기반의 엑세스 망에서 자원제어 시스템 구현," 대한전자공학회 하계종합학술대회 논문집 I, 제30권 제1호, pp.167-168, 2007년 7월
  18. TaeMan Han, TaeHyun Kwon, YoungWook Cha, SangHa Kim, "Management Information Model And High-Speed Resource Control Mechanism For Next Generation Network," CSN, 2007
  19. 3GPP TS 29.208 V6.7.0 (Release 6), "End-to-end Quality of Service (QoS) signaling flow," June 2007
  20. ITU-T Recommendation Y.1541, "Network performance objectives for IP-based services," February, 2006
  21. 박승철, "광대역 접속망에서 SIP QoS 지원방안," 정보과학회논문지, 정보통신 제34권 제 1호, 2007년 2월
  22. JDiameter, "https://jdiameter.dev.java.net"

Cited by

  1. Design and Implementation of Flooding based Energy-Efficiency Routing Protocol for Wireless Sensor Network vol.17C, pp.4, 2010, https://doi.org/10.3745/KIPSTC.2010.17C.4.371