Browse > Article
http://dx.doi.org/10.5392/JKCA.2012.12.01.048

A Secure Multipath Transmission Scheme Based on One-Way Hash Functions in Wireless Sensor Networks  

Lee, Yun-Jeong (충북대학교 정보통신공학부)
Kim, Dong-Joo (충북대학교 정보통신공학부)
Park, Jun-Ho (충북대학교 정보통신공학부)
Seong, Dong-Ook (한국과학기술원 전산학과)
Yoo, Jae-Soo (충북대학교 정보통신공학부)
Publication Information
Abstract
With the development of sensing devices and wireless communication technologies, wireless sensor networks are composed of a large number of sensor nodes that are equipped with limited computing performance and restricted communication capabilities. Besides, the sensor nodes are deployed in hostile or unattended environments. Therefore, the wireless sensor networks are vulnerable to security. In particular, the fatal damage may be occurred when data are exposed in real world applications. Therefore, it is important for design requirements to be made so that wireless sensor networks provide the strong security. However, because the conventional security schemes in wired networks did not consider the limited performance of the sensor node, they are so hard to be applied to wireless sensor networks. In this paper, we propose a secure multipath transmission scheme based on one-way hash functions in wireless sensor networks considering the limited performance of the wireless sensor nodes. The proposed scheme converts a sensor reading based on one of one-way hash functions MD5 in order to make it harder to be cracked and snooped. And then, our scheme splits the converted data and transfers the split data to the base station using multi-path routing. The experimental results show that our proposed scheme consumes the energy of just about 6% over the existing security scheme.
Keywords
Wireless Sensor Networks; Security; One-Way Hash Functions; MD5; Multi-path Routing;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 A. Pirzada and C. McDonald, "Trusted Greedy Perimeter Stateless Routing," Proc. of the ICON, pp.206-211, 2007.
2 http://mytears.org/resources/doc/Encode/md5.html.
3 김재현, 김석규, 이재용, "무선 센서 네트워크에서의 에너지 효율성을 고려한 MAC/라우팅 프로토콜", 전자공학회지, 제32권, 제7호, pp.57-73, 2005.
4 Y. Li and J. Ren, "Source-Location Privacy through Dynamic Routing in Wireless Sensor Network," Proc. of IEEE International Conference on Computer Communications (INFOCOM '10), pp.1-9, 2010.
5 우찬일, 김범식, "MD5 해쉬 함수와 대칭형 암호 시스템을 이용한 인증용 디지털 워터마킹", 전자공학회논문지, 제41권(TE), 제3호, pp.95-101, 2004.
6 윤현경, 김완경, 소우영, "MD5와 Crypt를 이용한 안전한 웹 인증 시스템의 설계 및 구현", 한국멀티미디어 학회 춘계 학술 발표 대회 논문집, pp.87-90, 2004.
7 Telecommunications Technology Associations, Security Requirements for USN services, 2009. (in Korean)
8 박준호, 여명호, 성동욱, 권현호, 이현정, 유재수, "센서 네트워크 환경에서 가상 식별자를 이용한 에너지 효율적인 다중 경로 데이터 라우팅 기법", 한국콘텐츠학회논문지, 제11권, 제7호, pp.70-79, 2011.
9 성동욱, 이윤정, 박준호, 유재수, "무선 센서 네트 워크 환경에서 반발력 기반 고-신뢰 데이터 라우팅 기법", 한국컴퓨터종합학술대회 논문집, 제38 권, 제1호(D), pp.171-174, 2011
10 황정연, "암호 프로토콜", 한국물리학회 특집호, 제16권, 제3호, pp.17-21, 2007.
11 R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks," Proc. of the IEEE International Conference on Communications(ICC'10), pp.105-110, 2010.
12 P. Samundiswary, D. Sathian, and P. Dananjayan, "Secured Greedy Perimeter Stateless Routing for Wireless Sensor Networks," International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), Vol.1, No.2, pp.9-20, 2010.   DOI
13 R. Rivest, "The MD5 Message-Digest Algorithm," MIT Laboratory for Computer Science and RSA Data Security Inc., 1992.
14 B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom '00), pp.243-254, 2000.
15 A. Pirzada and C. McDonald, "Establishing Trust In Pure Ad-hoc Networks," Proc. of Australasian Conference on Computer Science (ACSC), Vol.26, pp.47-54, 2004