Browse > Article

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network  

Yoon, Mi-Youn (한국정보보호진흥원)
Abstract
WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.
Keywords
Sensor Network; Key Management; Energy; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ateniese G., M. Steiner, and G. Tsudik. New Multiparty Authentication Services and Key Agreement Protocols. IEEE Journal on Selected Areas in Communication, 2000
2 McGrew, D., and A, Sherman, 'Key establishment in large dynamic groups using one-way function trees,' TIS Report No. 0755, TIS Lab; at Network Associates, Inc., Glenwood, MD(May 1998)
3 David W. Carman, P. Kruus and B. Matt, 'Constraints and Approaches for Distributed Sensor Network Security,' NAI LABS Technical Report, 2000
4 A. Perrig, R. Szewczyk, J.D. Tygar, Victorwen and E. Cullter, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks, 521-534, 2002
5 A. Perrig, R. Canetti, B. Briscoe, D. Tyger, and D. Song. 'TESLA: Multicast Source Authentication Transform,' Internet Draft, IETF, November 2000
6 Bellare, M and P. Rogaway, 'Entity Authentication and Key Distribution, ' Proceedings of Crypto93, LNCS 773, Springer-Verlag, 232-249, 1993
7 B. Krishnamachari, D. Estrin, and S. Wicker., 'The Impact of Data Aggregation in Wireless Sensor Networks.,' International Workshop on Distributed Event-Based Systems, (DEBS '02), Vienna, Austria, July 2002
8 Newman, B. and T. Ts'o, 'Kerberos: an Authentication Service for Computer Networks', IEEE Communications Magazine, 33-38, September 1994
9 Sencun Zhu, Sanjeev Setiam,Sushil Jajodia, 'LEAP: Efficient Security Mechanisms for LargeScale Distributed Sensor Networks,' CCS'03, 2003