• 제목/요약/키워드: sensor networks security

검색결과 363건 처리시간 0.106초

Location Privacy and Authentication for Low-cost Sensor Node Devices Using Varying Identifiers

  • Hamid Abdul;HONG Choong Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.412-414
    • /
    • 2005
  • Because a sensor node must operate on a tiny battery, the goal to eliminate energy inefficiencies leads the current researchers excavating for new techniques to advocate. As sensor networks edge closer towards wide spread deployment, security issues become a central concern. So far much research has focused on making sensor networks feasible and useful, and has not concentrated much on security issues especially computationally inexpensive techniques. In this paper we introduce a simple scheme relying on one-way hash-functions that greatly enhances location privacy by changing traceable identifiers on every read getting by with only a single, unreliable message exchange. Thereby the scheme is safe from many threats like eavesdropping, message interception, spoofing, and replay attacks.

  • PDF

Self-Organized Hierarchy Tree Protocol for Energy-Efficiency in Wireless Sensor Networks

  • THALJAOUI, Adel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.230-238
    • /
    • 2021
  • A sensor network is made up of many sensors deployed in different areas to be monitored. They communicate with each other through a wireless medium. The routing of collected data in the wireless network consumes most of the energy of the network. In the literature, several routing approaches have been proposed to conserve the energy at the sensor level and overcome the challenges inherent in its limitations. In this paper, we propose a new low-energy routing protocol for power grids sensors based on an unsupervised clustering approach. Our protocol equitably harnesses the energy of the selected cluster-head nodes and conserves the energy dissipated when routing the captured data at the Base Station (BS). The simulation results show that our protocol reduces the energy dissipation and prolongs the network lifetime.

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks

  • Chen, Zhihong;Lin, Hai;Wang, Lusheng;Zhao, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1238-1259
    • /
    • 2019
  • Saving energy is a big challenge for Wireless Sensor Networks (WSNs), which becomes even more critical in large-scale WSNs. Most energy waste is communication related, such as collision, overhearing and idle listening, so the schedule-based access which can avoid these wastes is preferred for WSNs. On the other hand, clustering technique is considered as the most promising solution for topology management in WSNs. Hence, providing interference-free clustering is vital for WSNs, especially for large-scale WSNs. However, schedule management in cluster-based networks is never a trivial work, since it requires inter-cluster cooperation. In this paper, we propose a clustering method, called Interference-Free Clustering Protocol (IFCP), to partition a WSN into interference-free clusters, making timeslot management much easier to achieve. Moreover, we model the clustering problem as a multi-objective optimization issue and use non-dominated sorting genetic algorithm II to solve it. Our proposal is finally compared with two adaptive clustering methods, HEED-CSMA and HEED-BMA, demonstrating that it achieves the good performance in terms of delay, packet delivery ratio, and energy consumption.

동적 클러스터 알고리즘을 이용한 무선 센서 네트워크에서 안전한 키 분배 방법 (A Secure Key Distribution Scheme on Wireless Sensor Networks Using Dynamic Clustering Algorithms)

  • 최동민;이여진;정일용
    • 한국멀티미디어학회논문지
    • /
    • 제10권2호
    • /
    • pp.236-245
    • /
    • 2007
  • 무선 센서 네트워크는 그 크기가 작고 제한적인 계산 능력과 저장 공간을 가지고 있으며 저용량의 배터리로 이루어진 많은 수의 노드들로 이루어진다. 이러한 조건에 따라 센서 네트워크 환경에서 센서 노드의 에너지 소모를 줄이는 것은 중요한 문제이다. 따라서 센서 노드의 에너지 소모를 줄이기 위해 노드가 전송하는 메시지의 발생 빈도를 줄이는 것이 고려되어야 한다. 또 다른 과제인 네트워크의 보안은 네트워크의 다양한 응용을 고려할 때 중요한 부분을 차지한다. 이에 본 논문에 서는 동적 클러스터 모델에서의 키 분배 방법을 제안한다. 이 방법에서 사용한 동적 클러스터 모델은 무선 센서 네트워크의 수명을 연장시키는데 매우 효과적인 방법이며 또한 제안한 방법은 클러스터를 구성하는 노드들에게 그리드 기반 키 분배방법을 적용하여 기존의 키 분배 방법에 비해 향상된 보안을 제공한다. 또한 기존에 제안된 그리드 기반, 위치 기반 키 분배 방법 및 클러스터 기반 키 분배 방법들과 비교하여 제안 방법의 우수함을 보였다.

  • PDF

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

계층적 무선 센서 네트워크에서의 키관리 메커니즘 (On the Security of Hierarchical Wireless Sensor Networks)

  • 엠디 압둘 하미드;홍충선
    • 대한전자공학회논문지TC
    • /
    • 제44권8호
    • /
    • pp.23-32
    • /
    • 2007
  • 본 논문에서는 계층적 무선 센서 네트워크를 위한 그룹기반 보안 메커니즘을 제안한다. 이를 위해 세 가지 형태의 노드(베이스 스테이션 그룹 관리 노드 센서 노드)로 구성된 3계층 센서네트워크에서 안전한 라우팅을 위한 구조를 설계한다. 그룹기반 배치는 가우시안(Gaussian) 분산을 이용하여 수행되며, 제안된 모델을 사용해 85% 이상의 네트워크 연결이 가능하다. 이미 보안 기능을 공유하고 있는 작은 그룹들은 안전한 그룹을 형성하고, 그룹 관리 노드들은 전체 네트워크의 백본을 형성한다. 본 논문의 보안 메커니즘은 배치된 센서 그룹에서 수집된 데이터를 처리하기 위해 제안되었으며, 관리노드에 의해 수집된 센싱 데이터는 다른 관리노드를 거쳐 베이스 스테이션에 전달된다. 제안된 메커니즘은 경량화 되었고, 노드 캡쳐 공격에 강력하게 대응할 수 있으며 분석 자료와 시뮬레이션을 결과를 통해 이러한 특징을 확인할 수 있다. 또한, 분석 자료를 통해 그룹 관리노드와 센서 노드가 조밀하게 배치되었을 때 안전성이 크게 향상됨을 알 수 있다.

무선 센서 네트워크와 GPS정보를 이용한 스마트 보안 CCTV 시스템 구현 (Implementation of smart security CCTV system based on wireless sensor networks and GPS data)

  • 윤경효;박진홍;김정준;서대화
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제37권8호
    • /
    • pp.918-931
    • /
    • 2013
  • 기존의 Pan-Tilt Zooming 카메라를 이용한 객체 추적은 카메라를 통해 획득한 영상을 분석하여 물체의 이동을 검출하였다. 그러나 이 방식은 영상처리를 위한 알고리즘과 이를 위한 하드웨어 비용이 소요되었다. 그리고 주변 환경의 변화나 영상 잡음 등으로 유효하지 않은 영상이 획득되는 경우나 사각지대가 존재하여 영상의 획득 자체가 불가능한 경우에는 대응이 어렵다. 본 논문에서는 영상 정보처리 기반의 객체 추적 기술이 가지는 한계를 극복하기 위해 무선 센서 네트워크 기반의 IEEE 802.15.4 표준을 적용한 GPS수신기가 장착된 센서노드를 시설물에 장착하여 센서노드의 가속도 센서가 장착된 시설물의 움직임을 인식하고 해당 센서노드의 GPS 정보를 이용하여 물체를 추적할 수 있는 시스템을 제안한다. 이 시스템은 영상처리에 요구되는 연산량을 감소시킴과 동시에 넓은 지역의 이동 물체를 추적할 수 있도록 효율적인 PTZ 카메라 제어를 가능하게 한다. 또한 센서노드의 유동적 장착이 가능할 수 있도록 무선의 메쉬 네트워크를 구현하여 설치의 효율성을 올렸다.

Quality of Service using Min-Max Data Size Scheduling in Wireless Sensor Networks

  • Revathi, A.;Santhi, S.G.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.327-333
    • /
    • 2022
  • Wireless Sensor Networks (WSNs) plays an important role in our everyday life. WSN is distributed in all the places. Nowadays WSN devices are developing our world as smart and easy to access and user-friendly. The sensor is connected to all the resources based on the uses of devices and the environment [1]. In WSN, Quality of Service is based on time synchronization and scheduling. Scheduling is important in WSN. The schedule is based on time synchronization. Min-Max data size scheduling is used in this proposed work. It is used to reduce the Delay & Energy. In this proposed work, Two-hop neighboring node is used to reduce energy consumption. Data Scheduling is used to identify the shortest path and transmit the data based on weightage. The data size is identified by three size of measurement Min, Max and Medium. The data transmission is based on time, energy, delivery, etc., the data are sent through the first level shortest path, then the data size medium, the second level shortest path is used to send the data, then the data size is small, it should be sent through the third level shortest path.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권2호
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF