A Reliable 2-mode Authentication Framework for Wireless Sensor Network

무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크

  • Published : 2009.06.30

Abstract

This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

본 논문은 다양한 공격들(헬로우 플러딩공격, 위치배치공격, 웜홀 공격, 싱크홀 공격, 중간포획공격)로부터 안전한 방어를 보장해야 하는 무선센서네트워크상에서 확률적 키 사전분배를 위한 신뢰성있는 2-모드 인증 프레임워크를 제안한다. 신뢰하는 이웃 노드의 ID를 저장하는 본 기법은 클러스터 헤드에서의 의존성을 감소시키며, 그 결과로 인증처리를 위한 단대단 전송을 제공할 뿐 아니라 소모되는 전력 에너지도 절약한다.

Keywords

References

  1. C. Karlof, N. Sastry, and D. Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 162.175, New York, NY, USA, 2004.
  2. A. Liu and P. Ning. Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In IPSN '08: Proceedings of the 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pages 245.256, Washington, DC, USA, 2008.
  3. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59.64, New York, NY, USA, 2004.
  4. H. Chan and A. Perrig, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In IEEE Proc. the 24th Annual Joint Conference of the IEEE Computer and Communications Societies Vol. 1, pp. 524-535, 2005.
  5. S. Zhu, S. Setia, and S. Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communications security, pp. 62 - 72, USA, 2003.
  6. A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, SPINS: Security protocols for sensor networks, Wireless Networks, pp. 521-534, 2001.
  7. Zigbee Alliance, http://www.zigbee.org/en/index.asp
  8. L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks. In ACM Conference on Computer and Communications Security, pages 41.47, 2002.
  9. H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197, 2003
  10. C. Karlof, Naveen Sastry, and David Wagner, TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162 – 175, USA, 2004.
  11. N. T.T. Huyen and E. Huh. An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. In ICUIMC '08, pages 441.447, 2008.
  12. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, P. Kruss, TinyPK: Securing sensor networks with public key technology, In Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, 2004, USA.
  13. W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004.
  14. W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In ACM Conference on Computer and Communications Security, pages 42.51, 2003.
  15. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Processings of the 10th ACM Conference on Computer and Communications Security (CCS), 2003.
  16. D. Liu and P. Ning. Improving key predistribution with deployment knowledge in static sensor networks. TOSN, 1(2):204. 239, 2005. https://doi.org/10.1145/1105688.1105691
  17. L. Zhou, J. Ni, and C. V. Ravishankar, Efficient Key Establishment for Group-based Wireless Sensor Deployments. In Proc. the 4th ACM Workshop on Wireless security, pp. 1-10, 2005.
  18. G. Li, J. He, and Y. Fu, A Hexagon-Based Key Predistribution Scheme in Sensor Networks. In Proc. of the 2006 International Conference Workshops on Parallel Processing, pp. 175-180, 2006.
  19. H.T.T. Nguyen, S. Na, G. Lee, and E. Huh. Accomplishment of the key setting up: The fexible approach. The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, July 2008, U.S.A.
  20. D.W. Carman. New directions in sensor network key management. International Journal of Distributed Sensor Networks, Volume 1:3.15, 13-5, 2005.
  21. A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, A Survey of Key Management in Ad Hoc Networks. In IEEE Communications Surveys & Tutorials, 3rd Quarter, Vol. 8, No. 3, pp. 48-66, 2006. https://doi.org/10.1109/COMST.2006.253271
  22. Y. Wang, G. Atterbury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, 2nd Quarter, Vol. 8, No. 2, pp. 2-23, 2006. https://doi.org/10.1109/COMST.2006.315852
  23. A. Vaseashta and S. Vaseashta, A Survey of Sensor Network Security. Sensors and Transducers Journal, V.7, pp. 91, 2007.
  24. R. Maheshwari, J. Gao, S. R Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information", In IEEE INFOCOM, 2007, USA