Browse > Article
http://dx.doi.org/10.7840/kics.2014.39B.6.360

Light Weight Authentication and Key Establishment Protocol for Underwater Acoustic Sensor Networks  

Park, Minha (Dept. of Financial Information Security, Graduate School, Kookmin University)
Kim, Yeog (Cryptography & Information Security Institute, Kookmin University)
Yi, Okyoen (Dept. of Mathematics, Kookmin University)
Abstract
Underwater Acoustic Sensor Networks(UASN) enables varied study from collected data of underwater environments such as pollution monitoring, disaster prevention. The collected data is transmitted from underwater to terrestrial communication entity by acoustic communication. Because of the constraints of underwater environments include low data rate and propagation delay, it is difficult to apply cryptographic techniques of terrestrial wireless communication to UASN. For this reason, if the cryptographic techniques are excluded, then collected data will be exposed to security threats, such as extortion and forgery, during transmission of data. So, the cryptographic techniques, such as the authentication and key establishment protocol which can confirm reliability of communication entities and help them share secret key for encryption of data, must need for protecting transmitted data against security threats. Thus, in this paper, we propose the light weight authentication and key establishment protocol.
Keywords
Underwater Acoustic Sensor Networks; Authentication; Secret Key; Key Establishment; Light-weight;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 J.-E. Kim, N.-Y. Yun, Y.-P. Kim, S.-Y. Shin, S.-H. Park, J.-H. Jeon, S.-J. Park, S. K. Kim, and C.-H. Kim, "Design and performance evaluation of hierarchical protocol for underwater acoustic sensor networks," J. Korea Soc. Simulation, vol. 20, no. 4, pp. 157-166, Dec. 2011.   과학기술학회마을   DOI   ScienceOn
2 ZigBee Alliance, ZigBee Specifications, 2007
3 J. Abraham and K. S. Ramanatha, "An efficient protocol for authentication and initial shared key establishment in clustered wireless sensor networks," Wirel. Optical Commun. Netw., 2006 IFIP Int. Conf., Bangalore, 2006.
4 J. Ibriq and I. Mahgoub, "A hierarchical key establishment scheme for wireless sensor networks," in Proc. AINA'07, pp. 210-219, Niagara Falls, Canada, May 2007.
5 K. Han and T. Shon, "Sensor authentication in dynamic wireless sensor network environments," Int. J. RFID Security and Cryptography (IJRFIDSC), vol. 1, no. 1-4, Mar.-Dec. 2012.
6 A. J. Menezes, et al., Chapter 10 in Handbook of Applied Cryptography, CRC Press, 1996.
7 WHOI Acoustic Communications: Micro-Mode, available from: http://acomms.whoi.edu/umdem
8 I. F. Akyildiz, D. Pompili, and T. Melodia, "Underwater acoustic sensor networks: research challenges," Ad Hoc Network 3, Elsevier, pp. 257-279, 2005
9 Y. Cong, G. Yang, Z. Wei, and W. Zhou, "Security in underwater sensor network," 2010 Int. Conf. Commun. Mobile Comput., pp. 162-168, Shenzhen, China, Apr. 2010.
10 R. B. Manjual and S. S. Manvi, "Issues in underwater acoustic sensor networks," Int. J. Comput. Electrical Eng., vol. 3, no. 1, pp. 101-110, Feb. 2011.
11 Z. Jiang, "Underwater acoustic networks-issues and solutions," Int. J. Intelligent Control Syst., vol. 13, no. 3, pp. 152-161, Sept. 2008.
12 G. Dini and A. L. Duca, "SeFLODD: A secure network discovery protocol for underwater acoustic networks," ISCC 2011 IEEE, pp. 636-638, Kerkyra, Jun.-Jul. 2011.
13 J.-Y. Lee, N.-Y. Yun, S. Muminov, S.-Y. Shin, Y.-S. Ryuh, and S.-H. Park, "A focus on practical assessment of MAC protocols for underwater acoustic communication with regard to network architecture," IETE Tech. Rev., vol. 30, no. 5, pp. 375-381, Sept.-Oct. 2013.   DOI