DOI QR코드

DOI QR Code

Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks

무선센서네트워크 환경에서 안전한 멀티캐스트를 지원하는 신속한 그룹키 갱신 기법

  • NamGoong, Wan (Graduate School for Information Security, Korea University) ;
  • Cho, Kwan-Tae (Graduate School for Information Security, Korea University) ;
  • Lee, Dong-Hoon (Graduate School for Information Security, Korea University)
  • 남궁완 (고려대학교 정보보호대학원) ;
  • 조관태 (고려대학교 정보보호대학원) ;
  • 이동훈 (고려대학교 정보보호대학원)
  • Received : 2010.12.04
  • Accepted : 2011.06.08
  • Published : 2011.06.30

Abstract

Messages need to transmit to the neighbors securely in wireless sensor network, because a sensor node is deployed in hostile area. Thus it is necessary to support secure communication. One of the most important communication part is secure multicast. Especially, group rekeying is a big problem for multicast key management. So, group rekeying must be proceed securely when secrete information is exposed by attacker. Many group rekeying schemes have been studied for ad hoc networks. However, these schemes are Ill1desirable in WSNs. In this paper, we proposed a novel group rekeying scheme in WSNs that it has very powerful security.

센서네트워크 환경에서 멀티캐스트는 베이스스테이션이 다수의 센서노드에게 명령 또는 쿼리를 전송할 때 사용된다. 멜티캐스트 메시지를 효율적으로 안전하게 전송하기 위하여 그룹키를 이용한 암호화 통신이 요구되며, 포획당한 노드로 인한 그룹키 노출에 강건한 그룹키 갱신기법이 필요하다. 이를 위하여 애드 혹 네트워크 환경에서 안전한 그룹키 갱신 기법이 오랫동안 연구되었다. 하지만 기존에 연구된 기법들은 센서네트워크에 적합하게 설계되지 않았으며, 안전한 그룹키 갱신하기 위한 효과적인 방법이 제안되지 못하였다. 따라서 본 논문에서는 그룹에 속한 센서노드만 새로운 그룹키 생성할 수 있는 방법을 통해서 기존의 기법에 비해 높은 안전성을 가지는 멀티캐스트 그룹키 갱신 기법을 제안한다.

Keywords

Acknowledgement

Grant : Car-헬스케어 보안 기술개발

Supported by : 한국산업기술평가관리원

References

  1. R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Construction," IEEE INFOCOM, pp. 708-176, Mar. 1999
  2. K. Ren, W. Lou, and Y. Zhang, "Multi-user Broadcast Authentication in Wireless Sensor Networks," IEEE Communications Society Conference, pp. 223-232, June 2007
  3. A. Perrig, D. Song, and D. tyhar, "ELK, A New Protocol for Efficient Large Group Key Distribution," IEEE Signal Processing, pp. 247-262, May 2001
  4. A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. Culler, "SPINS : Security Protocols for Sensor Networks," Wireless Network, vol.8, no.5, pp. 521-534, Sep. 2002 https://doi.org/10.1023/A:1016598314198
  5. C. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Transactions on networking, vol. 8, no. 1, Feb. 2000
  6. S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN : An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks," ACM Mobiquitous, pp. 42-51, Aug. 2004
  7. R.D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW:A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003
  8. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure Multicast Groups on Ad Hoc Networks," ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 94-102, 2003
  9. L. Laxos and R. Poovendram, "Energy -Aware Secure Multicast Communication in Ad Hoc Netwroks Using Geographical Location Information," IEEE International Conference on Acoustics Speech and Signal Processing, vol. 4 pp. IV-201-4, 2003
  10. S. Mittra, "Iolus : A framework for scalable secure multicasting," ACM Special Interest Group on Data Communication, pp. 277-288, 1997
  11. M. Bouassida, I. Chrisment and O. Festor, "An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks," NETWORKING LNCS 3042, pp. 725-742, 2004
  12. M. Bouassida, I. Chrisment and O. Festor, "Efficient Clustring for Multicast Key Distribution in MANET," NETWORKING LNCS pp. 138-153, 2005
  13. M. Bouassida, I. Chrisment and O. Festor, "Group Key Management in Manets," International Journal of Network Security, pp. 67-79 2008
  14. T. Chiang and Y. Huang, "Group Keys and the Multicast Security in Ad Hoc Networks," International Conference on Parallel Processing Workshops, pp. 385-390, Oct. 2003
  15. W. Zhang, S. Zhu, and G. Cao, "Predistribution and Local Collaboration -based Group Rekeying for Wireless Sensor Networks," Ad Hoc Network, vol. 7, pp. 1229-1242, Aug. 2009 https://doi.org/10.1016/j.adhoc.2008.11.004
  16. K. Ren, W. Lou, B. Zhu, and S. Jajodia "Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad Hoc Group Formation," IEEE Transactions on vehicular technology, vol.58, no. 4, pp. 2018-2029, May 2009 https://doi.org/10.1109/TVT.2008.2003961
  17. J. Hall, M. Barbeau, and E. Kranakis, "Detection of Transient in Radio Frequency Fingerprinting Using Phase Characteristics of Signals," IASTED International Conference on Wireless and Optical Communication (WOC), pp. 13-18, May 2003
  18. S. Marti, T. Giuli, T. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, pp. 255-265, Aug. 2000
  19. G. Wang, W. Zhang, and G. Cao, T. La Porta, "On Supporing Distribued Collaboration in Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 752-757, Oct. 2003
  20. A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT : Software-based Attestation for Embedded Devices," IEEE Symposium on Security and Privacy, May 2004
  21. T Shi-Chun, T Wen-Guey, and Z Kun-Yi, "Key establishment schemes against storage-bounded adversaries in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 8, no. 3, pp. 1218-1222, Mar. 2009 https://doi.org/10.1109/TWC.2009.081048
  22. M. Jadliwala, Z. Sheng, S.J. Upadhyaya, Q. Chunming, and J.P. Hubaux, "Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes," Mobile Computing, IEEE Transactions on, vol. 9, no. 6, pp. 810-823, Apr. 2010 https://doi.org/10.1109/TMC.2010.20
  23. F. Anjum, "Location dependent key management in sensor networks without using deployment knowledge," Wireless Networks, vol. 16, no. 6, pp. 1587-1600, Oct. 2008
  24. T.V. Srinath, "Localization in resource constrained sensor networks using a mobile beacon with in-ranging," Wireless and Optical Communications Networks, pp.5, Apr. 2006
  25. "The Network Simulator, ns-2," available at http://www.isi.edu/nsnam/ns
  26. A. Liu and P. Ning, "TinyECC : A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Information Processing in Sensor Networks(IPSN), pp. 245-256, 2008
  27. K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," The International Workshop on Scalable Ad Hoc and Sensor Networks(SASN), pp. 169-176, 2006
  28. A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C.Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," IEEE International Conf. Pervasive Computing and Communications (PerCom), pp. 324-328, Mar. 2005
  29. Y. Wang, G. Attebury, and B. Ramamurthy "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.