DOI QR코드

DOI QR Code

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep (Ubiquitous-IT, Dongseo University) ;
  • Cho, Sang-Il (Dongseo University) ;
  • Lee, Dea-Seok (Regional Innovation Center for Uniquitous Appliance, Dongseo University) ;
  • Lee, Young-Dong (BK21 Project Team for U-Healthcare Technology Development, Dongseo University) ;
  • Lee, Hoon-Jae (Division of Computer and Information Engineering, Dongseo University)
  • 투고 : 2010.03.12
  • 심사 : 2010.03.28
  • 발행 : 2010.04.30

초록

Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

키워드

참고문헌

  1. P. Kumar, S-I Cho and H. J. Lee, "PingPong-MAC: Secure Ubiquitous Sensor Network with Authenticated Encryption." In proc. of 2nd International Conference on Interaction Sciences, 2009, pp. 256-261.
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramamiam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communication Magazine, August 2002, pp. 102-114.
  3. H. J. Lee and K. Chen, "A New Stream Cipher for Ubiquitous Application," ICCIT, 2007, South Korea.
  4. C-C Chang, D. J. Nagel and S. Muftic, "Balancing Security and Energy Consumption in Wireless Sensor Networks" MSN 2007, LNCS 4864, pp 469-480.
  5. A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001.
  6. C. Karloff, N. Sastry and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, November 2004.
  7. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A Secure Sensor Network Communication Architecture" IPSN'07, April 2007, Cambridge, Massachusetts, USA.
  8. R. Watro, D. Kong, S-F Cuti, C. Gardiner, C. Lynn and P. Kruus, "TinyPK: Securing Sensor Networks with Public Key Technology", Workshop on Security of Ad-hoc and Sensor Networks, Washington DC, USA 2004.
  9. P. Kumar and H. J. Lee, "A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher", 2009, IEEE 5th International Joint Conference on INC, IMS and IDC.
  10. S. Y. Lim, C. C. Pu, H. T. Lim, and H. J. Lee, "Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption", 2007. [http://eprint.iacr.org/2007/204.pdf]
  11. K. Chen, M. Henricksen, W. Millan, J. fuller, L. Simpson, E. Dawson, H. J. Lee and S. Moon, "Dragon: A fast word based stream cipher". 2005/006, ECRYPT Stream Cipher Project Report.
  12. S. Ahmad, A. Wahla and F. Kausar, "Authenticated Encryption in WSN Using eSTREAM Ciphers", ISA 2009, LNCS 5576, pp. 741-749.
  13. S. Mahlknecht, "Energy-Self-Sufficient Wireless Sensor Networks for the Home and Building Environment", Doctor's thesis, Technical University of Vienna, 2004.
  14. B. Zoltak, "An Efficient Message Authentication Scheme for Stream Cipher", Cryptology ePrint Archive 2004.
  15. T. Ylonen, "SSH-Secure login connection over the Internet", 1996, 6th USENIX Security Symposium.
  16. Security Architecture for the Internet Protocol. RFC2401, 1998.
  17. OpenSSL. http://www.openssl.org
  18. http://www.maxfor.co.kr/online%20brochure.pdf
  19. http://www.tinyos.net/
  20. http://www.tinyos.net/tinyos-1.x/doc/nesc/ref.pdf.
  21. F. Kausar and A. Naureen, "A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment", 2009, ISA 2009, LNCS 5576, pp.682-691.

피인용 문헌

  1. Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks vol.9, pp.4, 2010, https://doi.org/10.1155/2013/348783