Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.3.239

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network  

Zhung, Yon-Il (경희대학교 컴퓨터공학과)
Lee, Sung-Young (경희대학교 컴퓨터공학과)
Abstract
Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.
Keywords
Ubiquitous Sensor Network(USN); Sensor Security; Sensor Authentication; Double-Key Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 TinySec home page, http://www.cs.berkelev.edu/~nks/tinysec/
2 Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, 'SPINS:Security Protocols for Sensor Networks', Proceedings of Seventh Annal International Conference on Mobile Computing and Networks, July 2001   DOI
3 D.J. Malan, M. Welsh, and M.D. Smith. 'A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography', Fist IEEE International Conference on Sensor and Ad Hoc Communication and Networks, 2004   DOI
4 Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor, 'MiniSec: A Secure Sensor Network Communication Architecture', http://www.truststc.org/pubs/197/ paper.pdf   DOI
5 서운석, 신순자, 구자동, 임진수, '유비쿼터스 컴퓨팅 환경에서 보안 및 인증 서비스 방향 연구', 한국전산원, http://www.ipc.go.kr/servlet/download?pt=/ipckor/policy&fn=file.pdf
6 김신효, 강유성, 정병호, 정교일, 'u-센서 네트워크 보안 기술 동향', http://ettrends.etri.re.kr/PDFData/20-1_093_099.pdf   과학기술학회마을
7 Zigbee Document 03322r6ZB, Security Services Specification Release0.80, April, 2004
8 Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Song, 'Efficient Authentication and Signing of Multicast Streams over Lossy Channels', IEEE Symposium on Security and Privacy, May 2000   DOI
9 한종수, 배성수, 김경목, '유비쿼터스기술(RFID)와 홈 네트워킹)', 도서출판세화, 2005
10 손승원, '네트워크 보안 기술의 현재와 미래', 한국 정보 진흥원, 2004
11 Tieyan Li, 'Security Map of Sensor Network', http:// www.i2r.a-star.edu.sg/icsd/SecureSensor/papers/security-map.pdf, March. 2005
12 B. C. Neumann and T. Ts'o, 'Kerberos: An authentication service for computer networks', IEEE Commun. Mag., vol. 32, no. 9, pp. 33-38, Sep. 1994   DOI   ScienceOn
13 CC2420 Data, http://www.cs.ucsb.edu/-nchohan/docs/CC2420DataSheet.pdf
14 IEEE 802.15 Task Group 4 (TG4), http://www.ieee802.org/15/pub/TG4.html
15 Network Working Group X.509, http://www.ietf.org/rfc/rfc2459.txt
16 손상철, 윤미연, 이광겸, 신용태, '실시간 유비쿼터스 센서 네트워크에서 비밀 분산 기법에 기반한 효율적인 키 관리에 관한 연구', 한국 컴퓨터 종합 학술 대회 논문집 Vol.32, No.1(A) pp. 202-204, 2005
17 TinyOS home page, http://www.tinyos.net/