• Title/Summary/Keyword: ubiquitous sensor networks

Search Result 336, Processing Time 0.028 seconds

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.

Gateway Architecture for Ubiquitous Access to ZigBee-Based Sensor Networks (ZigBee 기반 센서 네트워크로의 유비쿼터스 접근을 위한 게이트웨이 아키텍처)

  • Heo, Ung;Peng, Qiu;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.73-83
    • /
    • 2010
  • This paper investigates protocol architecture of a Web-ZigBee gateway for interconnecting TCP/IP-based networks and ZigBee/IEEE802.15.4-based wireless sensor networks. The Web-ZigBee gateway delivers data between the TCP/IP network and the ZigBee network. Since those two networks have different communication protocols, a protocol translation mechanism is needed. Herein, we propose a method to deliver query messages from the Internet to the sensor network and receive data from sensors. The protocol translation is performed in the translation layer that is placed above the two application layers, i.e., the Internet application layer and ZigBee application layer. Among various interfaces, we use CGI programming to take care of translation functions efficiently. The CGI manages query information from a client on the Internet and data from the ZigBee sensor network. Whereas the TCP/IP enabled sensor network overlays two heterogeneous communication protocols, overlaying layers increase the complexity and cost of implementing the sensor network. On the contrary, the sensors in our gateway-based system are not only light (because each communication protocol works independently without overlaying), but also efficient because the translation layer mostly alleviates header overloading.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Ubiquitous u-Health System using RFID & ZigBee (RFID와 ZigBee를 이용한 유비쿼터스 u-Health 시스템 구현)

  • Kim Jin-Tai;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.79-88
    • /
    • 2006
  • In this paper, we designed and implemented ubiquitous u-Health system using RFE and ZigBee. We made a wireless protocol Kit which combines RFE Tag recognition and ZigBee data communication capability. The software is designed and developed on the TinyOS. Wireless communication technologies which hold multi-protocol stacks with RFID and result in the wireless ubiquitous world could be Bluetooth, ZigBee, 802.11x WLAN and so on. The environments that the suggested u-Health system may be used is un-manned nursing, which would be utilized in dense sensor networks such as a hospital. The the size of devices with RFID and ZigBee will be so smaller and smaller as a bracelet, a wrist watch and a ring. The combined wireless RFID-ZigBee system could be applied to applications which requires some actions corresponding to the collected (or sensed) information in WBAN(Wireless Body Area Network) and/or WPAN(Wireless Person Area Network). The proposed ubiquitous u-Health system displays some text-type alert message on LCD which is attached to the system or gives voice alert message to the adequate node users. RFE will be used as various combinations with other wireless technologies for some application-specific purposes.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Design of Integrated Security Framework for Open Wireless Networking Architecture (공개 무선 통신망 구조를 위한 복합 보안 프레임워크 설계)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.288-289
    • /
    • 2013
  • An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will converge the integration of Open Ubiquitous Sensor Network (OUSN) with security protocols for applying the their applications. We analysed unique network-centric features and security mechanism of various heterogeneous wireless networks.

  • PDF

Position Recognition and User Identification System Using Signal Strength Map in Home Healthcare Based on Wireless Sensor Networks (WSNs) (무선 센서네트워크 기반 신호강도 맵을 이용한 재택형 위치인식 및 사용자 식별 시스템)

  • Yang, Yong-Ju;Lee, Jung-Hoon;Song, Sang-Ha;Yoon, Young-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.4
    • /
    • pp.494-502
    • /
    • 2007
  • Ubiquitous location based services (u-LBS) will be interested to an important services. They can easily recognize object position at anytime, anywhere. At present, many researchers are making a study of the position recognition and tracking. This paper consists of postion recognition and user identification system. The position recognition is based on location under services (LBS) using a signal strength map, a database is previously made use of empirical measured received signal strength indicator (RSSI). The user identification system automatically controls instruments which is located in home. Moreover users are able to measures body signal freely. We implemented the multi-hop routing method using the Star-Mesh networks. Also, we use the sensor devices which are satisfied with the IEEE 802.15.4 specification. The used devices are the Nano-24 modules in Octacomm Co. Ltd. A RSSI is very important factor in position recognition analysis. It makes use of the way that decides position recognition and user identification in narrow indoor space. In experiments, we can analyze properties of the RSSI, draw the parameter about position recognition. The experimental result is that RSSI value is attenuated according to increasing distances. It also derives property of the radio frequency (RF) signal. Moreover, we express the monitoring program using the Microsoft C#. Finally, the proposed methods are expected to protect a sudden death and an accident in home.

RSSI based Indoor Location Tracking System using Wireless Sensor Network technology (무선 센서네트워크 기술을 활용한 RSSI기반의 실내위치인식 시스템)

  • Kwon, Joon-Dal;Shin, Jae-Wook;Shin, Kwang-Sik;Lee, Eun-Ah;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.364-367
    • /
    • 2007
  • We combined CC2431(Chipcon, Norway), as the platform for the Indoor Location Tracking, which follows Zigbee/IEEE802.15.4 standards in RSSI (Received Signal Strength Indicator) and Base Station Node and then, embodied Indoor Location Tracking System. CC2431 is composed of the Reference Node that transfer its current position at the designated place and the Blind Node. The Blind node receives the current position(X and Y coordinates) of the Reference Node fields which are being contiguous and also, calculates its current position and transfers it to the Base Station Node. The base station node is used for receiving the current position of blind node and passing its data to the PC as a gateway. We can make sure where is the Blind Node not only from the out-of-the-way place of the server side but from the outside in a real-time.

  • PDF

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

SPSF : Smart Plant Safety Framework based on Reliable-Secure USN (차세대 USN기반의 스마트 플랜트안전 프레임워크 개발)

  • Jung, Ji-Eun;Song, Byung-Hun;Lee, Hyung-Su
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.102-106
    • /
    • 2010
  • Recently process industries from oil and gas procedures and mining companies to manufactures of chemicals, foods, and beverages has been exploring the USN (Ubiquitous Sensor Networks) technology to improve safety of production processes. However, to apply the USN technology in the large-scale plant industry, reliability and security issues are not fully addressed yet, and the absence of the industrial sensor networking standard causes a compatibility problem with legacy equipment and systems. Although this situation, process industry such as energy plants are looking for the secure wireless plant solution to provide detailed, accurate safety monitoring from previously hard-reach, unaccordable area. In this paper, SPSF (Smart Plant Safety Framework based on Reliable-Secure USN) is suggested to fulfill the requirements of high-risk industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference. The SPSF consists of three main layers: 1) Smart Safety Sensing Layer, 2) Smart Safety Network Layers, 3) Plant Network System Layer.

  • PDF