Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.3.29

Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network  

Jang Kun-Won (Soongsil University)
Shin Dong-Gyu (Soongsil University)
Jun Moon-Seog (Soongsil University)
Abstract
Recent advances in wireless communication technology promotes many researches related to sensor network and brings several proposals to fit into various types of sensor network communication. The research direction for sensor network is divided into the method to maximize an energy efficiency and security researches that has not been remarkable so far. To maximize an energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed, In. However, the combined method to satisfy both energy efficiency and security is in the shell. This paper is devoted to design the protocol that combines an efficient clustering protocol with key management algorithm that is fit into various types of sensor network communication. This protocol may be applied to sensor network systems that deal with sensitive data.
Keywords
Secure sensor network; Routing protocol; Clustering; Key management;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, 'An Application-Specific Protocol Architecture for Wireless Microsensor Networks,' IEEE Transactions on Wireless Communications,,Vol. 1, No. 4, pp. 660-670, October 2002   DOI   ScienceOn
2 C. Karlof, N. Sastry, U. Shankar, and D. Wagner, 'TinySec: TinyOS Link Layer Security Proposal,' Unpublished manuscript, version 1.0, July 2002
3 임용훈, 정연돈, 김명호, '데이터 기반 센서 네트워크에서 다차원 영역 질의를 위한 동적 데이터 분산,' 한국정보과학회논문지 (D), 33(1), pp. 32-41, 2006   과학기술학회마을
4 C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, 'Perfectly-secure key distribution for dynamic conferences,' In Advances in Cryptology, Proceedings of CRYPTO' 92, LNCS 740, pp. 471-486, 1993
5 T. Shepard, 'A channel access scheme for large dense packet radio network,' In proceeding of ACM SIGCOMM, pp. 219-230, August 1996
6 R. Gennaro and P. Rohatgi, 'How to sign digital streams,' Advances in Cryptology - Crypto '97, In Burt Kaliski, editor, pp. 180-197, 1997
7 P. Rohatgi, 'A compact and fast hybrid signature scheme for multicast packet authentication,' In 6th ACM Conference on Computer and Communications Security, November 1999
8 송인철, 노요한, 현동준, 김명호, '센서 네트워크에서의 데이터 수집을 위한 라우팅 기법,' 한국정보과학회논문지 (D), 33(2), pp.188-200, 2006   과학기술학회마을
9 C. Karlof and D. Wagner, 'Secure Routing in Sensor Networks: Attacks and Countermeasures,' To appear in Proceeding of First IEEE Workshop on Sensor Network Protocols and Applications, May 2003
10 정윤수, 황윤철, 이건명, 이상호, '무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜,' 한국정보과학회논문지 (I), 33(2), pp. 131-138. 2006   과학기술학회마을
11 A. Perrig, R. Canetti, J. Tygar, and D. Song, 'Efficient authentication and sign ing of multicast streams over lossy channels,' IEEE Symposium on Security and Privacy, May 2000
12 C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: A scalable and robust communication paradigm for sensor networks,' In Proceedings. of Fourth Annual ACM International conference on Mobile Computing and Networks(Mobicom), August 2000
13 S. Zhu, S. Setia, and S. Jajodia, 'LEAP: Efficient Security Mechanismsfor Large-Scale Distributed Sensor Networks,' In Proceedings. of the 10th ACM CCS '03, October 2003
14 A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, 'SPINS: Security Protocols for Sensor Networks,' In Proceeding. of Seventh Annual ACM International conference on Mobile Computing and Networks(Mobicom ), July 2003
15 T. Kwon and M. Gerla, ' Clustering with power control,' In proceeding of MILCOM, vol. 2, November 1999
16 S. Sarma, S. Weis, and D. Engels, 'RFID Systems and Security and Privacy Implications,' Auto ID Center White Paper, November 2002