센서네트워크 통신을 위한 안전한 데이터 전송 기법

A Secure Data Transmission Mechanism for Sensor Network Communication

  • 도인실 (이화여자대학교 컴퓨터학과) ;
  • 채기준 (이화여자대학교 컴퓨터학과)
  • 발행 : 2007.08.31


효율적인 센서 네트워크 통신이 가능하기 위해서는 보안을 제공하는 라우팅 메커니즘이 필수적이다. 본 연구에서는 안전한 데이터 통신이 가능하도록 하기위해 센서 네트워크 필드를 육각형의 클러스터로 사전에 나누고 가우시안 분포에 따라 각 클러스터에 노드를 배치한 다음 각 클러스터의 클러스터헤드와 게이트웨이 노드를 통해 센서 노드가 감지한 정보를 클러스터헤드론 통해 모아서 보안 정보와 함께 베이스 스테이션에 전달하는 메커니즘을 제안한다. 제안 메커니즘은 전체적인 오버헤드를 효과적으로 줄이면서 효율성을 보장할 뿐 아니라 다양한 라우팅 공격에 대한 저항성을 갖는다.

For reliable sensor network communication, secure data transmission mechanisms are necessary. In our work, for secure communication, we cluster the network field in hexagonal shape and deploy nodes according to Gaussian distribution. After node deployment, clusterheads and gateway nodes in each cluster play the role of aggregating and delivering the sensed data with suity information all the way to the base station. Our mechanism decreases the overhead and provides food performance. It also has resilience against various routing attacks.



  1. D. W. Carman, P. S. Kruus, and B. J. Matt, 'Constraints and approaches for distributed sensor network security,' Technical report, NAI Labs, 2000
  2. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' In Proceedings of the IEEE International Conference on Network Protocols(ICNP), Nov. 2002
  3. M. G. Zapata and N. Asokan, 'Securing ad hoc routing protocols,' In Proceedings of ACM Workshop on Wireless Security (WiSe), ACM Press, 2002
  4. Y-C. Hu, D. B. Johnson, and A. Perrig, 'Secure efficient distance vector routing in mobile wireless ad-hoc networks,' In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Jun. 2002
  5. Y.-C Hu, A. Perrig, and D. B. Johnson, 'Ariadne: a secure on-demand routing protocol for ad hoc networks,' In Proceedings of the 8th Annual International Conference on Mobile computing and Networking, Sep. 2002
  6. P. Papadimitratos and Z. Haas, 'Secure routing for mobile ad hoc networks,' In Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002
  7. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' In Proceedings of 7th Annual International Conference on Mobile Computing and Networks MOBICOM 2001, Jul. 2001
  8. C. Karlof, N. Sastry, and D. Wagner, 'Tinyflec: a link layer security architecture for wireless sensor networks,' In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04), 2004
  9. J. Deng, R. Han, and S. Mishra, 'A performance evaluation of intrusion-tolerant routing in wireless sensor networks,' In Proceedings IEEE 2nd International Workshop on Information Processing in Sensor Networks (IPSN '03), Apr. 2003
  10. G. G. Finn, 'Routing and addressing problems In large metropolitan-scale internetworks,' Technical Report ISI/RR-87-180, lSI, Mar. 1987
  11. B. Blum, T. He, S. Son, and J. Stankovic, 'IGF: A state-free robust communication protocol for wireless sensor networks,' Technical Report CS-2003-11, Univ. of Virginia, Charlottesville, VA, 2003
  12. B. Karp and H. T. Kung, 'GPSR: Greedy perimeter stateless routing for wireless networks,' In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM-00), Aug. 2000
  13. Y-J. Kim, R. Govindan, B. Karp, and S. Shenker, 'Geographic routing made practical,' In Proceedings of USENIX Symposium on Networked Systems Design and Implementation, May 2005
  14. Z. J. Haas, M. R. Pearlm, and P. Samar, 'The Zone Routing Protocol (ZRP) for ad hoc networks,' IETF MANET Internet Draft, Jul. 2002
  15. Anthony D. Wood, Lei Fang, John A. Stankovic, Tian He, 'SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks,' In Proceedings of the SASN'06, Oct. 30, 2006
  16. 도인실, 채기준, 김호원, '배치정보를 이용한 클러스터 기반 센서 네트워크 키 설정 메커니즘,' 한국정보처리학회논문지 13-C권 제2호, 2006년 4월
  17. 'The Network Simulator: ns-2,' Available at: [Last accessed; Jun 26, 2007.]
  18. C. Karlof and D. Wagner, 'Secure routing in wireless sensor networks: Attacks and countermeasures,' Elsevier's Ad-Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Sep. 2003
  19. Z. Yu and Y. Guan, 'A Robust Group based Key Management Scheme for Wireless Sensor Networks,' IEEE Communications Society, WCNC 2005
  20. IEEE 802.15.4 - 2003 IEEE Standard for Information Technology-Part 15.4: Wireless Medium Access Control (MAC) and Physical layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANS), 2003
  21. F. Ye, H. Luo, S. Lu, and L. Zhang, 'Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks,' In Proceedings of IEEE INFOCOM 2004