Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.1.29

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN  

Oh, Jeong Min (Graduate School of Information Security, Korea University)
Jeong, Ik Rae (Graduate School of Information Security, Korea University)
Byun, Jin Wook (Pyeongtaek University)
Abstract
In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.
Keywords
Wireless sensor networks; software-defined networking; key distribution; physical unclonable functions; Fuzzy extractor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Sezer, S. Scott-Hayward, P.-K. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao, "Are we ready for SDN? Implementation challenges for software-defined networks," IEEE Communications Magazine, vol. 51, no. 7, pp. 36-43, 2013.   DOI
2 A. De Gante, M. Aslan, and A. Matrawy, "Smart wireless sensor network management based on software-defined networking," In Communications (QBSC), pp. 71-75, 2014
3 Z. Shu, J. Wan, D. Li, J. Lin, A. V. Vasilakos, and M. Imran, "Security in software-defined networking: Threats and countermeasures," Mobile Networks and Applications, vol. 21, no. 5, pp. 764-776, 2016.   DOI
4 P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, "A security enforcement kernel for OpenFlow networks," In Proceedings of the first workshop on Hot topics in software defined networks, pp. 121-126, 2012
5 X. Wen, Y. Chen, C. Hu, C. Shi, and Y. Wang, "Towards a secure controller platform for OpenFlow applications," In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 171-172, 2013
6 T. Luo, H.-P. Tan and T. Q. S. Quek, "Sensor OpenFlow: Enabling software- defined wireless sensor networks," IEEE Communications letters, Vol. 16, No. 11, pp. 1896-1899, 2012   DOI
7 M. P. Fernandez, "Comparing OpenFlow controller paradigms scalability: Reactive and proactive," In Advanced Information Networking and Applications, pp.1009-1016, 2013
8 S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A survey of securing networks using software defined networking," IEEE Transactions on Reliability, vol. 64, no. 3, pp. 1086-1097, 2015.   DOI
9 S. Shin, P. Porras, V. Yegneswaran, and M. Fong, "FRESCO: Modular composable security services for software-defined networks," In 20th Annual Network & Distributed System Security Symposium. 2013
10 J. R. Ballard, I. Rae, and A. Akella, "Extensible and scalable network monitoring using OpenSAFE," In Proceedings of USENIX Internet Network Management Workshop/Workshop on Research on Enterprise Networking, pp. 8, 2010.
11 M. Huang, B. Yu, and S. Li, "Puf-assisted group key distribution scheme for software-defined wireless sensor networks," IEEE Communications Letters, Vol. 22, no. 2, pp. 404-407, 2018   DOI
12 J. Delvaux and I. Verbauwhede, "Key-recovery attacks on various RO-PUF constructions via helper data manipulation," In Proceedings of the conference on Design, Automation & Test in Europe, pp. 72, 2014
13 Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," In International conference on the theory and applications of cryptographic techniques, pp. 523-540, 2004.
14 Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, and Jongchan Lee, "A reusable fuzzy extractor with practical storage size: Modifying canetti et al.'s construction," In Australasian Conference on Information Security and Privacy, pp. 28-44, 2018.
15 M. Bellare and P. Rogaway, "Entity authentication and key distribution," In Annual international cryptology conference, pp. 232-249, 1993