• Title/Summary/Keyword: sensor networks security

Search Result 363, Processing Time 0.021 seconds

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

An efficient Broadcast Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안)

  • Moon Hyung-Seok;Lee Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.23-29
    • /
    • 2006
  • It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Cooperative Data Forwarding in Border Surveillance Networks (국경감시망에서의 협력적 데이터 포워딩 방법)

  • Oh, Se-Min;Kim, Dong-Wan;An, Sun-Shin;Boudriga, Noureddine
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.196-198
    • /
    • 2014
  • Wireless Sensor Networks(WSN) 기반의 Border Surveillance Networks(BSN)는 다양한 제한조건을 동반하며 침입 혹은 환경 등을 감시함을 목적으로 하고 있기 때문에 이벤트 발생시 신뢰적인 데이터 전송은 매우 중요한 부분을 차치하게 된다. 본 논문에서 적용한 대표적인 요구기반 라우팅 방법인 Ad hoc On-demand Distance Vector Routing(AODV)는 BSN 에 적용하였을 경우 홉 수(Hop Count)를 메트릭으로 최적의 경로를 계산하고 선택하여 Uni-Path 로 데이터를 전송하게 된다. 이때 AODV 는 Uni-path 로 데이터 전송을 진행하게 되며 링크의 단절이 빈번히 발생하는 BSN 의 환경적 요인으로 데이터 전송의 신뢰성이 감소하게 될 것이며 이는 비효과적인 데이터 전송을 야기하게 된다. 따라서 본 논문에서는 Multi-path 개념을 도입하여 데이터 전송 시 링크단절에 의해 발생하는 시간의 지연을 줄이고 더욱 신뢰성 있게 데이터를 전송할 수 있는 방법을 제안한다. 제안하는 방법은 송, 수신하는 두 노드의 전송범위에 공통으로 속한 노드들이 전송되는 데이터를 중복 전송하게 된다. 그리하여 링크의 단절이 일어날 경우 발생하는 경로 재 탐색 및 경로복구의 발생 빈도를 줄이고 동시에 데이터 전송률을 증가시켜 신뢰적인 데이터 전송을 하게 된다.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

Security Review of B-MAC Communication Protocol (B-MAC통신 프로토콜에서 보안 리뷰)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.447-452
    • /
    • 2013
  • Berkley Media Access Control (B-MAC) protocol is one of the well-known MAC protocols, which uses adaptive preamble sampling scheme and is designed for wireless sensor networks (WSN). In this paper, we are reviewed about security vulnerability in B-MAC, and analyzed the power which is consumed at each stage of B-MAC protocol according to vulnerability of denial of sleep(DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general B-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in B-MAC.

Autonomous Vehicles as Safety and Security Agents in Real-Life Environments

  • Al-Absi, Ahmed Abdulhakim
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.7-12
    • /
    • 2022
  • Safety and security are the topmost priority in every environment. With the aid of Artificial Intelligence (AI), many objects are becoming more intelligent, conscious, and curious of their surroundings. The recent scientific breakthroughs in autonomous vehicular designs and development; powered by AI, network of sensors and the rapid increase of Internet of Things (IoTs) could be utilized in maintaining safety and security in our environments. AI based on deep learning architectures and models, such as Deep Neural Networks (DNNs), is being applied worldwide in the automotive design fields like computer vision, natural language processing, sensor fusion, object recognition and autonomous driving projects. These features are well known for their identification, detective and tracking abilities. With the embedment of sensors, cameras, GPS, RADAR, LIDAR, and on-board computers in many of these autonomous vehicles being developed, these vehicles can properly map their positions and proximity to everything around them. In this paper, we explored in detail several ways in which these enormous features embedded in these autonomous vehicles, such as the network of sensors fusion, computer vision and natural image processing, natural language processing, and activity aware capabilities of these automobiles, could be tapped and utilized in safeguarding our lives and environment.

Slope Movement Detection using Ubiquitous Sensor Network (USN을 이용한 사면거동 탐지)

  • Chang, K.T.;Ho, Albert;Jung, Chun-Suk;Jung, Hoon
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.61-66
    • /
    • 2008
  • More than 70% of Korea consists of mountainous area and during the construction of roads and railroads many cut-slopes are inevitably formed. A number of environmental factors, such as the rainy season and frost heave during winter/thaw during spring, can result in rock falls and landslides. The failure of slopes is increasing every year and can cause damage to vehicles, personal injury and even fatality. In order to help protect people and property, there is a need for real-time monitoring systems to detect the early stages of slope failures. In this respect, the GMG has been using Translation Rotation Settlement (TRS) sensor units installed on slopes to monitor movement in real-time. However, the data lines of this system are vulnerable and the whole system can be damaged by a single lightning strike. In order to overcome this, GMG have proposed the use of Ubiquitous Sensor Networks (USN). The adoption of a USN system in lieu of data cables can help to minimize the risk of lightning damage and improve the reliability of slope monitoring systems.

  • PDF

Key Predistribution Schemes Using Key Chains for Wireless Sensor Networks (키 체인을 이용한 무선 센서네트워크 키 분배 방식)

  • Kim Kyung-Joon;Park Kwang-Kyu;Song Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.591-594
    • /
    • 2006
  • 무선 센서 네트워크에서는 센서 노드의 제약으로 인해 공개키 알고리즘을 쓰기에는 적합하지 않다. 비밀키 방식을 사용할 경우 가장 문제가 되는 부분은 키 분배 문제이다. 한 가지 방법은 센서 노드들이 배치되기 전에 미리 센서 노드들에 키를 심어 놓음으로써 해결할 수 있다. 본 논문은 키 체인을 이용해 이러한 방식을 개선하여 더욱 향상된 보안성을 제공하는 프로토콜을 제시한다.

  • PDF