• 제목/요약/키워드: sensor networks security

검색결과 363건 처리시간 0.025초

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Chen, Ying;Ge, Yangming;Wang, Wenyuan;Yang, Fengyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1779-1798
    • /
    • 2018
  • Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuzzy extractor is adopted to handle the user's biometric information. Secondly, we achieve mutual authentication and key agreement among three entities, which are user, gateway and cluster head in the four phases. Finally, formal security analysis shows that the proposed scheme defends against various security pitfalls. Additionally, comparison results with other surviving relevant schemes show that our scheme is more efficient in term of computational cost, communication cost and estimated time. Therefore, the proposed scheme is well suitable for practical application in HEWSN.

수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점 (Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks)

  • 신동현;이승준;김창화
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권11호
    • /
    • pp.2769-2792
    • /
    • 2013
  • In this paper, we propose an authenticated key agreement scheme, TinyIBAK, based on the identity-based cryptography and bilinear paring, for large scale sensor networks. We prove the security of our proposal in the random oracle model. According to the formal security validation using AVISPA, the proposed scheme is strongly secure against the passive and active attacks, such as replay, man-in-the middle and node compromise attacks, etc. We implemented our proposal for TinyOS-2.1, analyzed the memory occupation, and evaluated the time and energy performance on the MICAz motes using the Avrora toolkits. Moreover, we deployed our proposal within the TOSSIM simulation framework, and investigated the effect of node density on the performance of our scheme. Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in large scale sensor networks. Compared with other ID-based key agreement approaches, TinyIBAK is much more efficient or comparable in performance but provides rekeying. Compared with the traditional key pre-distribution schemes, TinyIBAK achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying.

An Adaptive Key Redistribution Method for Filtering-based Wireless Sensor Networks

  • Kim, Jin Myoung;Lee, Hae Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2518-2533
    • /
    • 2020
  • In wireless sensor networks, adversaries may physically capture sensor nodes on the fields, and use them to launch false positive attacks (FPAs). FPAs could be conducted by injecting forged or old sensing reports, which would represent non-existent events on the fields, with the goal of disorientating the base stations and/or reducing the limited energy resources of sensor nodes on the fields. Researchers have proposed various mitigation methods against FPAs, including the statistical en-route filtering scheme (SEF). Most of these methods are based on key pre-distribution schemes and can efficiently filter injected false reports out at relay nodes through the verification of in-transit reports using the pre-distributed keys. However, their filtering power may decrease as time goes by since adversaries would attempt to capture additional nodes as many as possible. In this paper, we propose an adaptive key distribution method that could maintain the security power of SEF in WSNs under such circumstances. The proposed method makes, if necessary, BS update or re-distribute keys, which are used to endorse and verify reports, with the consideration of the filtering power and energy efficiency. Our experimental results show that the proposed method is more effective, compared to SEF, against FPAs in terms of security level and energy saving.

동적 여과 프로토콜 적용 센서 네트워크에서의 퍼지 기반 보안 경계 값 결정 기법 (A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy System)

  • 이상진;이해영;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.197-200
    • /
    • 2008
  • In most sensor networks, nodes can be easily compromised by adversaries due to hostile environments. Adversaries may use compromised nodes to inject false reports into the sensor networks. Such false report attacks will cause false alarms that can waste real-world response effort, and draining the finite amount of energy resource in the battery-powered network. A dynamic enroute scheme proposed by Yu and Guan can detect and drop such false reports during the forwarding phase. In this scheme, choosing a threshold value is very important, as it trades off between security power and energy consumption. In this paper, we propose a threshold determining method which uses the fuzzy rule-based system. The base station periodically determines a threshold value though the fuzzy rule-based system. The number of cluster nodes, the value of the key dissemination limit, and the remaining energy of nodes are used to determine the threshold value.

  • PDF

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

드론 기반 무선 센서 네트워크의 통신 및 보안 기술 동향 (Communication and Security Technology Trends in Drone-assisted Wireless Sensor Network)

  • 왕기철;이병선;안재영
    • 전자통신동향분석
    • /
    • 제34권3호
    • /
    • pp.55-64
    • /
    • 2019
  • In drone-assisted wireless sensor networks, drones collect data from sensors in an energy-efficient manner and quickly distribute urgent information to sensor nodes. This article introduces recent communication and security schemes for drone-assisted wireless sensor networks. For the communication schemes, we introduce data collection optimization schemes, drone position and movement optimization schemes, and drone flight path optimization schemes. For the security schemes, we introduce authentication and key management schemes, cluster formation schemes, and cluster head election schemes. Then, we present some enhancement methodologies for these communication and security schemes. As a conclusion, we present some interesting future work items.

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Choi, Jeong-Woon;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권4호
    • /
    • pp.376-384
    • /
    • 2009
  • In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

센서 네트워크에서 코드분배 메커니즘에 대한 조사 연구 (A Survey of Code Dissemination Mechanisms on Sensor Networks)

  • 김미희;김지선;김지현;임지영;채기준
    • 정보처리학회논문지C
    • /
    • 제16C권4호
    • /
    • pp.423-438
    • /
    • 2009
  • 센서 네트워크는 유비쿼터스 컴퓨팅 구현을 위한 기반 네트워크 중의 하나로 그 중요성이 점차 부각되고 있으며 센서 네트워크 및 노드 특성상 효율성 및 안전성을 제공하기 위한 다양한 기반 기술이 연구되고 있다. 특히 센서 네트워크는 많은 노드 수로 구성되어 있고 많은 응용에서 외부 환경에 무작위 배포로 배치되어 사용되므로 센서 노드에서 실행되는 코드의 기능에 대한 업그레이드나 버그 수정을 위한 코드분배 방법이 원격으로 수행되어야 하며 무선 환경으로 실행코드를 배포해야 하므로 안전성이 특히 중요한 분야라고 할 수 있다. 본 논문에서는 최근 센서 네트워크에서의 새로운 연구 주제로 주목 받고 있는 이러한코드분배 메커니즘들을 조사하여 요구 사항 및 그 특징에 대하여 비교 분석하였다. 이를 통해 센서 네트워크에서의 코드분배 메커니즘에 대한 향후 연구 방향을 제시함으로써 효율성 및 안정성을 제공할 수 있는 코드분배에 관한 연구를 촉진하고 센서 네트워크의 활용도를 제고하자 한다.

무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대한 재고 (Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks)

  • 권태경;이종협;송주석
    • 정보보호학회논문지
    • /
    • 제19권2호
    • /
    • pp.165-169
    • /
    • 2009
  • 본 논문에서는 무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대해서 재고한다. 먼저 랜템키사전 분배기법의 기본적인 단계인 경로키 설정이 성능면에서 비실용적임을 보이고, 이를 크게 개선하기 위한 새로운 기법을 제시하고 그 성능을 분석한다.