DOI QR코드

DOI QR Code

무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구

On Concealing Data-Path Against Eavesdropping in Wireless Networks

  • 차영환 (상지대학교 컴퓨터공학과)
  • 투고 : 2020.04.07
  • 심사 : 2020.06.15
  • 발행 : 2020.06.30

초록

무선망에서 통신 경로상의 노드들은 데이터 전달 시마다 전자기적 신호를 방출하므로 일련의 발생 신호들을 포착하여 분석하면 해당 경로가 노출 및 탐지될 수 있다. 악의적 도청자에 대응하는 방법의 하나로는 특정 노드들로 하여금 더미(거짓) 패킷을 생성하도록 하여 마치 데이터 경로상의 노드들처럼 보이도록 하는 것이다. 이 논문에서는 근원지와 도착지 간에 최단 경로를 한 번에 설정하면서 더미 패킷의 과도한 생성을 억제하는 패킷 전송 프로토콜을 제안한다. 시뮬레이션을 통해 통신 경로상의 노드 위치 기밀 수준을 검증한다.

Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

키워드

참고문헌

  1. P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, "Enhancing source-location privacy in sensor networking routing," In Proc. of Int. Conf. on Distributed Computing System 2005, Columbus, Ohio, USA, June 2005, pp. 1-10.
  2. K. Mehta, D. Liu, and M. Wright, "Protecting location privacy in sensor networks against a global eavesdropper," IEEE Trans. Mobile Computing, vol. 11, no. 2, Feb. 2012, pp. 320-336. https://doi.org/10.1109/TMC.2011.32
  3. Y. Tscha, "Concealing communication paths in wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 1, 2014, pp. 115-130.
  4. Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, "Source location privacy against laptop-class attacks in sensor networks," In Proc. of ACM 4th Int. Conf. on Security and Privacy in Communication Networks, Istanbul, Turkey, Sept. 2008, pp. 5-14.
  5. Y. Tscha, "Generation of dummy messages depending upon the location privacy level in sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 9, 2016, pp. 861-867. https://doi.org/10.13067/JKIECS.2016.11.9.861
  6. M. Yon and Y. Him, "A study on hierarchical communication method for energy efficiency in sensor network environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, 2014, pp. 889-897. https://doi.org/10.13067/JKIECS.2014.9.8.889
  7. K. Kim, B. Kim, S. Bae, and D. Kim, "An improved message broadcast scheme over wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 588-594.
  8. C. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-804. https://doi.org/10.13067/JKIECS.2012.7.4.797
  9. Y. Dalal and R. Metcalfe, "Reverse path forwarding of broadcast packets," Communications of the ACM, vol. 21, no. 12, Dec. 1978, pp. 1040-1048. https://doi.org/10.1145/359657.359665
  10. C. Lee, "Design by improved energy efficiency MAC protocol based on wireless sensor networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 3, 2017, pp. 439-444. https://doi.org/10.13067/JKIECS.2017.12.3.439
  11. Y. Kwon, T. Kim, and J. Choi "TDMA-based low power mac protocol design of wireless sensor networks for vehicle detection," J. of the Korea Institute of Electronic Communication Sciences, vol. 13, no. 5, 2018, pp. 1003-1010. https://doi.org/10.13067/JKIECS.2018.13.5.1003