• Title/Summary/Keyword: ${\mu}TESLA$

Search Result 31, Processing Time 0.039 seconds

New Constructions of Multi-level ${\mu}TESLA$ with Immediate Authentication (인증지연 없는 멀티-레벨 ${\mu}TESLA$의 새로운 구성)

  • Lim, Chae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.163-167
    • /
    • 2006
  • Multi-level ${\mu}TESLA$ is an efficient extension to ${\mu}TESLA$ to provide an extended lifetime for long-lived sensor networks. This paper presents new constructions of multi-level ${\mu}TESLA$ with immediate authentication of key chain commitments. The proposed constructions are shown to be more efficient and robust than the previous multi-level ${\mu}TESLA$ extension.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.

Study of Operating μTESLA in Multi-hop Unattended WSN (멀티 홉 UWSN 환경에서의 μTESLA 운영에 관한 고찰)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.459-470
    • /
    • 2013
  • ${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

Development of Medical System using Time-varying Magnetic field (시변 펄스형 자기장 의료기기 시스템)

  • Kim, In-Soo S.;Hong, Jung-Hwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2343-2351
    • /
    • 2007
  • In this paper, we describe the design and implementation of time-varying magnetic field stimulator. Novel design for power supply part to generate high repetitive magnetic field for very short time(less than $300{\mu}s$) was achieved. Using the novel designed power supply part and the circular type coil probe, we've achieved high magnetic field up to 1.2 Tesla in 20Hz repetition rate.

Depiction of Acute Stroke Using 3-Tesla Clinical Amide Proton Transfer Imaging: Saturation Time Optimization Using an in vivo Rat Stroke Model, and a Preliminary Study in Human

  • Park, Ji Eun;Kim, Ho Sung;Jung, Seung Chai;Keupp, Jochen;Jeong, Ha-Kyu;Kim, Sang Joon
    • Investigative Magnetic Resonance Imaging
    • /
    • v.21 no.2
    • /
    • pp.65-70
    • /
    • 2017
  • Purpose: To optimize the saturation time and maximizing the pH-weighted difference between the normal and ischemic brain regions, on 3-tesla amide proton transfer (APT) imaging using an in vivo rat model. Materials and Methods: Three male Wistar rats underwent middle cerebral artery occlusion, and were examined in a 3-tesla magnetic resonance imaging (MRI) scanner. APT imaging acquisition was performed with 3-dimensional turbo spin-echo imaging, using a 32-channel head coil and 2-channel parallel radiofrequency transmission. An off-resonance radiofrequency pulse was applied with a Sinc-Gauss pulse at a $B_{1,rms}$ amplitude of $1.2{\mu}T$ using a 2-channel parallel transmission. Saturation times of 3, 4, or 5 s were tested. The APT effect was quantified using the magnetization-transfer-ratio asymmetry at 3.5 ppm with respect to the water resonance (APT-weighted signal), and compared with the normal and ischemic regions. The result was then applied to an acute stroke patient to evaluate feasibility. Results: Visual detection of ischemic regions was achieved with the 3-, 4-, and 5-s protocols. Among the different saturation times at $1.2{\mu}T$ power, 4 s showed the maximum difference between the ischemic and normal regions (-0.95%, P = 0.029). The APTw signal difference for 3 and 5 s was -0.9% and -0.7%, respectively. The 4-s saturation time protocol also successfully depicted the pH-weighted differences in an acute stroke patient. Conclusion: For 3-tesla turbo spin-echo APT imaging, the maximal pH-weighted difference achieved when using the $1.2{\mu}T$ power, was with the 4 s saturation time. This protocol will be helpful to depict pH-weighted difference in stroke patients in clinical settings.

SPINS 보안 프로토콜 중 SNEP의 구현

  • Jang, Beom-Su;Lee, Gi-Yeong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.197-198
    • /
    • 2006
  • 본 논문에서는 센서 네트워크에 SPINS 보안 프로토콜을 적용하여 그 성능을 판별하려 하였다. 센서 네트워크의 보안을 유지하기 위해 SPINS에서는 SNEP과 ${\mu}TESLA$로 세분화 되어 데이터 인증, 보안과 키 관리를 각각 담당하게 된다. 본 논문에서는 그 중 SNEP을 nesC를 이용하여 TinyOS기반 센서에 적용하였다.

  • PDF

The Bootstrapping Scheme Providing Scalable Broadcast Authentication in Wireless Sensor Networks (무선 센서 네트워크 환경에서 확장성 있는 브로트캐스트 인증을 제공하기 위한 초기화 프로토콜)

  • Kim Joon-Wan;Kim Yong-Ho;Lee Dong-Hoon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.595-598
    • /
    • 2006
  • 무선 센서네트워크에서의 브로드캐스트 인증은 중요한 문제이다. 이를 위해 ${\mu}-TESLA$와 이를 개선한 멀티레벨 ${\mu}-TESLA$ 방법 등이 제안되었다. 이들 모두는 인증을 성공적으로 수행하기 위해 브로드캐스트 메시지를 보내고자 하는 당사자의 해시체인 commitment를 인증 받으려는 상대방에게 안전하게 전달해야만 했다. 하지만, 센서들이 랜덤하게 배치될 경우 각 노드는 인증을 위해 전체 노드 수만큼의 commitment를 저장해야만 하는 문제점을 지니고 있다. 이를 해결하기 위해 Chen 등은 브로드 캐스트 인증에 사용되는 해시 체인 commitment를 안전하고 효율적인 방법으로 전달하는 방안을 제안하였다. 그러나 불행이도 이들의 방법은 노드 추가가 원천적으로 불가능하고, 초기화 과정에서 부득이하게 참여하지 못한 노드를 구제할 방법이 전혀 없어 큰 비용 낭비를 초래한다. 뿐만 아니라 베이스 스테이션이 비밀 값을 재사용 할 경우 안전성에도 큰 문제가 발생한다. 제안하는 스킴은 멀티 세션을 적용하고 비밀 값에 대한 해시 체인을 구성하여 앞서 열거된 모든 문제점을 해결함으로써 안전하고 효율적인 commitment 전달 방법을 제시한다. 아울러 주고받는 메시지에 대한 무결성 검증을 제공한다.

  • PDF

Sensor Network Broadcast Authentication for Bridge State Monitoring (교량 감시를 위한 센서 네트워크 브로드캐스트 인증기법)

  • Lim, Hwa-Jung;Lee, Heon-Guil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.995-998
    • /
    • 2005
  • 센서 네트워크는 자원의 제약을 지닌 수 많은 센서들로 구성되어있어 보안에 취약하다. 따라서 데이터를 안전하기 전달하기 위해 센서 노드와 노드, 노드와 베이스스테이션 사이에 인증을 요구하게 된다. 본 논문에서는 센서 노드와 베이스스테이션 사이에 집합 노드 (aggregate node)들을 두어 집합 노드와 베이스스테이션 사이에 강력한 시간동기화를 요구하지 않는 TESLA 기법과 집합 노드와 센서 노드 사이에 ${\mu}TESLA$ 기법을 적용하여 교량 환경에 보다 효율적인 브로드캐스트 인증기법 방안을 제시한다.

  • PDF