A Reliable 2-mode Authentication Framework for Wireless Sensor Network

무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크

  • Published : 2009.06.30

Abstract

This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

본 논문은 다양한 공격들(헬로우 플러딩공격, 위치배치공격, 웜홀 공격, 싱크홀 공격, 중간포획공격)로부터 안전한 방어를 보장해야 하는 무선센서네트워크상에서 확률적 키 사전분배를 위한 신뢰성있는 2-모드 인증 프레임워크를 제안한다. 신뢰하는 이웃 노드의 ID를 저장하는 본 기법은 클러스터 헤드에서의 의존성을 감소시키며, 그 결과로 인증처리를 위한 단대단 전송을 제공할 뿐 아니라 소모되는 전력 에너지도 절약한다.

Keywords

References

  1. C. Karlof, N. Sastry, and D. Wagner. Tinysec: a linklayer security architecture for wireless sensornetworks. In SenSys '04: Proceedings of the 2ndinternational conference on Embedded networkedsensor systems, pages 162.175, New York, NY,USA, 2004.
  2. A. Liu and P. Ning. Tinyecc: A configurable libraryfor elliptic curve cryptography in wireless sensornetworks. In IPSN '08: Proceedings of the 2008International Conference on Information Processingin Sensor Networks (ipsn 2008), pages 245.256,Washington, DC, USA, 2008.
  3. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn,and P. Kruus. Tinypk: securing sensor networkswith public key technology. In SASN '04:Proceedings of the 2nd ACM workshop on Securityof ad hoc and sensor networks, pages 59.64, NewYork, NY, USA, 2004.
  4. H. Chan and A. Perrig, PIKE: Peer Intermediariesfor Key Establishment in Sensor Networks. In IEEEProc. the 24th Annual Joint Conference of the IEEEComputer and Communications Societies Vol. 1,pp. 524-535, 2005.
  5. S. Zhu, S. Setia, and S. Jajodia, LEAP: efficientsecurity mechanisms for large-scale distributedsensor networks. In Proceedings of the 10th ACMconference on Computer and communicationssecurity, pp. 62 - 72, USA, 2003.
  6. A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.Tygar, SPINS: Security protocols for sensornetworks, Wireless Networks, pp. 521-534, 2001.
  7. Zigbee Alliance,http://www.zigbee.org/en/index.asp
  8. L. Eschenauer and V. D. Gligor, Akey-management scheme for distributed sensornetworks. In ACM Conference on Computer and Communications Security, pages 41.47, 2002.
  9. H. Chan, A. Perrig, and D. X. Song. Random keypredistribution schemes for sensor networks. InIEEE Symposium on Security and Privacy, pages197, 2003
  10. C. Karlof, Naveen Sastry, and David Wagner,TinySec: a link layer security architecture forwireless sensor networks. In Proceedings of the2nd international conference on Embeddednetworked sensor systems, pp. 162 – 175, USA,2004.
  11. N. T.T. Huyen and E. Huh. An efficient signalrange based key pre-distribution scheme ensuringthe high connectivity in wireless sensor network.In ICUIMC '08, pages 441.447, 2008.
  12. R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn,P. Kruss, TinyPK: Securing sensor networks withpublic key technology, In Proceedings of the 2ndACM workshop on Security of Ad Hoc and SensorNetworks, pp. 59-64, 2004, USA.
  13. W. Du, J. Deng, Y. S. Han, S. Chen, and P.K.Varshney. A key management scheme for wirelesssensor networks using deployment knowledge. InINFOCOM, 2004.
  14. W. Du, J. Deng, Y. S. Han, and P. K. Varshney. Apairwise key pre-distribution scheme for wirelesssensor networks. In ACM Conference onComputer and Communications Security, pages42.51, 2003.
  15. D. Liu and P. Ning. Establishing pairwise keys indistributed sensor networks. In Processings of the10th ACM Conference on Computer andCommunications Security (CCS), 2003.
  16. D. Liu and P. Ning. Improving key predistributionwith deployment knowledge in static sensornetworks. TOSN, 1(2):204. 239, 2005. https://doi.org/10.1145/1105688.1105691
  17. L. Zhou, J. Ni, and C. V. Ravishankar, EfficientKey Establishment for Group-based WirelessSensor Deployments. In Proc. the 4th ACMWorkshop on Wireless security, pp. 1-10, 2005.
  18. G. Li, J. He, and Y. Fu, A Hexagon-Based KeyPredistribution Scheme in Sensor Networks. InProc. of the 2006 International ConferenceWorkshops on Parallel Processing, pp. 175-180,2006.
  19. H.T.T. Nguyen, S. Na, G. Lee, and E. Huh.Accomplishment of the key setting up: The fexibleapproach. The 2008 World Congress in ComputerScience, Computer Engineering, and AppliedComputing, July 2008, U.S.A.
  20. D.W. Carman. New directions in sensor networkkey management. International Journal ofDistributed Sensor Networks, Volume 1:3.15,13-5, 2005.
  21. A. M. Hegland, E. Winjum, S. F. Mjolsnes, C.Rong, O. Kure, and P. Spilling, A Survey of KeyManagement in Ad Hoc Networks. In IEEECommunications Surveys & Tutorials, 3rdQuarter, Vol. 8, No. 3, pp. 48-66, 2006. https://doi.org/10.1109/COMST.2006.253271
  22. Y. Wang, G. Atterbury, and B. Ramamurthy, “ASurvey of Security Issues in Wireless SensorNetworks,” IEEE Communications Surveys andTutorials, 2nd Quarter, Vol. 8, No. 2, pp. 2-23,2006. https://doi.org/10.1109/COMST.2006.315852
  23. A. Vaseashta and S. Vaseashta, A Survey ofSensor Network Security. Sensors andTransducers Journal, V.7, pp. 91, 2007.
  24. R. Maheshwari, J. Gao, S. R Das, "DetectingWormhole Attacks in Wireless Networks usingConnectivity Information", In IEEE INFOCOM,2007, USA