DOI QR코드

DOI QR Code

WSN의 에너지 효율적 운영을 위한 신뢰성이 보장된 IDE-LEACH 프로토콜

IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment

  • 조영복 (충북대학교 전자정보대학 소프트웨어학과) ;
  • 우성희 (한국교통대학교 의료정보공학과) ;
  • 이상호 (충북대학교 전자정보대학 소프트웨어학과)
  • 투고 : 2013.08.28
  • 심사 : 2013.09.30
  • 발행 : 2013.10.31

초록

WSN은 수백에서 수 만개에 달하는 SN들로 구성된다. WSN은 에너지 불균형 문제 해결을 위해 각 라운드마다 클러스터헤드를 새롭게 선택하고, 안전한 통신을 위해 노드 인증방식을 사용하고 있다. 그러나 이런 방법은 각 라운드마다 재-클러스터링을 수행함으로 SN의 오버헤드를 가중시키는 원인이 되고 안전한 통신을 제공하기 위한 인증단계는 빈번히 발생되는 AREQ/AREP 메시지 처리로 노드의 오버헤드를 더욱 가중시키고 있다. 라서 이 논문에서는 WSN 환경에서 에너지 효율적 운영과 신뢰성이 보장된 IDE-LEACH(Identity based Encryption : IDE) 프로토콜을 제안한다. 제안 프로토콜은 기존 LEACH 기반의 프로토콜보다 통신에 평균적으로 20%까지 네트워크 수명을 연장하였고, 통신에 참여하는 모든 노드는 기지국으로부터 인증을 거친 신뢰할 수 있는 노드들로 구성된다.

WSN consists of hundreds to thousands of sensor nodes. In order to solve the problem of energy consumption imbalance cluster head is reelected in every round, while node authentication scheme is utilized for secure communication. However, re-clustering increases the overhead of sensor nodes and during the node authentication phase the frequent AREQ/AREP message exchange also increases the overhead. Therefore, a secure and energy efficient protocol, by which overhead of sensor nodes is reduced and long time communication is achieved, is required for wireless sensor network. In this paper, an energy efficient and reliable IDE-LEACH protocol for WSN is proposed. The proposed protocol is prolongs networks lifetime about average 20% compared to the LEACH-based protocols and all attending nodes in communication form BS authentication consisted of trusted nodes.

키워드

참고문헌

  1. J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Commun., vol. 11, no. 6, pp. 6-28, Dec. 2004.
  2. W. S. Juang, "Efficient user authentication and key agreement in wireless sensor networks," in Proc. Int. Workshop Inform. Security Applicat. (WISA '06), pp. 15-29, Jeju Island, Korea, Aug. 2006.
  3. T. T. Huyen and E. N. Huh, "A reliable 2-mode authentication framework for ubiquitous sensor network," J. Korean Soc. Internet Inform. (KSII), vol.10, no.3, pp. 51-60 Jun. 2008.
  4. T. T. Huyen and E. N. Huh, "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network," in Proc. Int. Conf. Ubiquitous Inform. Management Commun. (ICUIMC'08), pp. 441-447, Suwon, Korea, Jan.-Feb. 2008.
  5. C. Perrig, "SPINS: security protocols for sensor networks," J. ACM Wireless Networks, vol. 8, no. 5, pp. 521-534, Sep. 2002. https://doi.org/10.1023/A:1016598314198
  6. S. H. Lee and J. B. Suk, "Improvement of energy efficiency of LEACH protocol for wireless sensor networks," J. Korea Inform. Commun. Soc. (KICS), vol. 33, no. 2, pp. 76-81, Feb. 2008.
  7. G. Yang, C. M. Rong, C. Veigner, J. T. Wang, and H. B. Cheng, "Identity-based key agreement and encryption for wireless sensor networks," J. China Univ. Posts Telecommun., vol. 12, no. 4, pp. 54-60, Dec. 2006.
  8. B. S. Kim and H. B. Lim, "A study on node authentication mechanism using sensor node's energy value in WSN," J. Inst. Electron. Eng. Korea (IEEK), vol. 48, no. 2, pp. 86-95, Mar. 2011.
  9. Y. Y. Choo, H. J. Choi, and J. W. Kwon, "Algorithm improving network life-time based on LEACH protocol," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 35, no. 8. pp. 810-819, Aug. 2010.
  10. M. L. Kim, H. S. Kim, and Y. D. Son, "The conversion method from ID-based encryption to ID-based dynamic threshold encryption," J. Korea Inst. Inform. Security Cryptology (KIISC), vol. 22, no. 4, pp. 733-744, Aug. 2012.
  11. H. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM Conf., pp. 524-535, Miami, U.S.A., Mar. 2005.
  12. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Advances Cryptology Conf. (CRYPTO 2001), pp. 213-229, Santa Barbara, U.S.A., Aug. 2001.
  13. A. Shamir, "Identity-based crypto systems and signature schemes," in Proc. Advances Cryptology (CRYPTO 84), pp. 47-53, Santa Barbara, U.S.A., Aug. 1984.
  14. Y. B. Cho and S. H. Lee, "An IDE based hierarchical node authentication protocol for secure data transmission in WSN environment," J. Korean Inst. Commun. Inform. Sci. (KICS), vol. 37B, no. 3, pp. 149-157, Mar. 2012. https://doi.org/10.7840/KICS.2012.37B.3.149

피인용 문헌

  1. On the HIDE based Group Signature for Secure Personal Healthcare Record Service vol.19, pp.10, 2015, https://doi.org/10.6109/jkiice.2015.19.10.2481