Browse > Article

Public Key based LR-WPAN Security Algorithm  

Kim, Jin-Cheol (Korea Electric Power Data Network)
Oh, Young-Hwan (Department of Electronics and Communication Engineering, Kwangwoon Univ.)
Publication Information
Abstract
Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.
Keywords
IEEE 802.15.4; ZigBee;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ZigBee Alliance Document 03522 : Security Service Specification, December 2004
2 이지홍,하인수,김인식,'PCS와 원칩 마이크로콘트롤러를 이용한 원격검침 시스템,' 2000년도 대한전자공학회 하계종합학술대회 논문지 제23권 제1호, pp. 171-174, 2000   과학기술학회마을
3 박종연,조호찬,최승지,'전력선 통신과 공중 전화망에 의한 전력량의 원격 검침 시스템의 개발,' 2002년도 대한전자공학회 하계종합학술대회 논문지 제25권 제1호, pp. 311-314, 2000   과학기술학회마을
4 Messerges T. et al, 'A Security Design for a General Purpose, Self-organizing, Multihop Ad Hoc Wireless Network,' MITSUBISHI ELECTRIC RESEARCH LABORATORIES TR2003-114, December 2004
5 유병익, 임정미, 유선영, 박창섭, '이중 해쉬체인에 기반을 둔 Link-State 라우팅 보안 매커니즘,' 한국정보보호학회 논문지 제13권 제2호, 2003   과학기술학회마을
6 Chartwell, 'The Chartwell AMR Report 2003 8th Edition, October 2003
7 PLC포럼 디지털 가전위원회,'Home Network Control Protocol (HNCP)PreSpec. Ver.1.0,' PLC 포럼, 2002
8 기술표준원,'고속 전력선통신(PLC) 국가표준(KS)공청회,' 2006
9 V. Shoup, 'Practical Threshold Signatures,' Proceedings of EUROCRYPT '00, Springer-Verlag, Lecture Notes in Computer Science 1807, pp. 207-220, May 2000
10 Yih-Chum Hu, Adrian Perrig, David B. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,' Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02), September 2002
11 Xinjun Du Ying Wang Jianhua Ge Yumin Wang, 'A Method for security Enhancements in AODV Protocol,' Proceedings of the 17 th International Conference on Advanced Information Networking and Applications (AINA '03), March 2003   DOI
12 J. Staddon, S. Miner, and M. Franklin, 'Self-Healing Key Distribution with Revocation,' Proceedings of 2002 IEEE Symposium on Security and Privacy (S&P2002), May 2002   DOI
13 Haiyun Luo, Petros Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, 'Self-securing Ad Hoc Wireless Networks,' 7th IEEE Symposium on Computers and Communications (ISCC '02), July 2002   DOI
14 Frank Staiano, Ross Anderson, 'The Resurrecting Duckling : Security Issues in Ad-Hoc Wireless networks,', Security Protocols, 7th International Workshop Proceedings   DOI   ScienceOn
15 Konrad Wrona, 'Distributed Security: Ad Hoc Networks & Beyond,' Ad Hoc Network Security PAMPAS Workshop, September 2002
16 L. Zhou and Z. J Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, pp. 24-30, November/December 1999   DOI   ScienceOn
17 J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 'Providing robust and ubiquitous security support for mobile ad-hoc networks,' Proceedings of International Conference on Network Protocols (ICNP '01), November 2001
18 Frank Stajano, 'The Resurrecting Duckling: What Next?,' Security Protocols, 7th International Workshop Proceedings, Springer-Verlag, Lecture Notes in Computer Science, April 2000