유비쿼터스 센서 네트워크 보안

  • 임채훈 (세종대학교 인터넷학과)
  • Published : 2005.08.25

Abstract

무선 네트워킹과 소형화 기술의 발전은 고정된 기반시설이 없는 열악한 환경에서도 초소형의 센서 노드들을 무작위 배치하여 애드혹 네트워킹을 통해 순간적으로 네트워크 인프라를 구축하고 긴밀한 협동 작업을 통해 복잡한 환경감지를 가능하게 하는 센서 네트워크의 개발을 이루어냈다. 각 센서 노드들은 매우 제한적인 능력을 가지고 있지만 이들의 협동작업은 마치 미세한 신경세포 조직이 상호작용하여 동물의 신체활동을 가능하게 하듯이 기존의 네트워킹이나 컴퓨팅에서는 불가능했던 많은 응용들을 가능하게 하여 우리의 생활환경을 스마트한, 지능적인 환경으로 만들어 줄 수 있다. 본 고에서는 이러한 센서 네트워크의 기존 네트워크와의 차별화되는 특징 및 응용에 따른 다양한 보안이슈와 최신 보안기술 연구동향들을 살펴보기로 한다.

Keywords

References

  1. I.F.Akyiliz, W.Su, Y.Sankarasubramaniam and E.Cayirci, A survey on sensor networks, IEEE Communications Magazine, August 2002, pp. 102-114
  2. R.Anderson, H.Chan and A. Perrig, Key infecition: Smart trust for smart dust, 12th IEEE International Conference on Network Protocols (ICNP), Oct. 2004
  3. S.Basagni, K.Herrin, D.Bruschi and E.Rosti, Secure pebblenets, MobiHOC 2001, pp. 156-163
  4. H.Chan, A.Perrig, and D. Song, Random key predistribution schemes for sensor networks, IEEE Symposium on Research in Security and Privacy. 2003, pp. 197-213
  5. H.Chan and A.Perrig, Security and privacy in sensor networks, IEEE Computer, Octber 2003, pp.103-105
  6. W.Du, J.Deng, Y.Han and P.K.Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, CCS' 03, October 27-30, 2003, Washington, DC.
  7. L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, ACM CCS 2002, Nov.2002
  8. P.Ganessan, R.Venugopalan, P.Peddabachagari, A.Dean, F.Muller and M.Sichitiu, Analyzing and modeling encryption overhead for sensor network nodes, WSNA' 03, September 19, 2003, San Diego, California, USA
  9. G.Gaubatz, J.Kaps and B.Sunar, Public key cryptography in sensor networks-revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), 2004
  10. P.Gorder, Sizing up smart dusts, Computing in Science & Engineering, 5(6), Nov.-Dec. 2003, pp.6-9 https://doi.org/10.1109/MCISE.2003.1238697
  11. C.Hartung, J.Balasalle and R.Han, Node compromise in sensor networks: The need for secure systems, Technical Report CUCS-988-04, Dept. of Computer Science, University of Colorado at Boulder, 2004
  12. J.Hill and D.E.CuiIer, Mica: a wireless platform for deeply embedded networks, IEEE Micro, Nov.-Dec. 2002, pp. 12-24
  13. Hill, M.Horton, R.Kling and L.Krishnamurthy, The platforms enabling wireless sensor networks, Communications of the ACM, Vol.47, No.6,June 2004, pp.41-46 https://doi.org/10.1145/990680.990705
  14. F.Hu, J.Ziobro, J.Tillett and N.Sharma, Secure wireless sensor networks: Problems and solutions,J. of SCI, to appear, 2004
  15. C.Karlof and D.Wagner, Secure routing in wireless sensor networks: Attacks and contemeasures, Ad Hoc Networks, vol. 1, issues 2-3 (Special Issue on Sensor Network Applications and Protocols), Elsevier, Sep, 2003, pp.293-315
  16. C.Karlof, N.Sastary and D.Wagner, Tinysec: A link layer security architecture for wireless sensor networks, ACM SenSys 2004, Nov. 3-5,2004
  17. Y.W.Law, S.Dulman, S.Etalle and P. Havinga, Assessing security-critical energy-efficient sensor networks, 18th IFIP International Information Security Conference, May 2003
  18. Y.W.Law and J.M.Doumen and P.H.Hartel, Benchmarking block ciphers for wireless sensor networks (Extended abstract), 1st IEEE Int, Conf, on Mobile Ad-hoc and Sensor Systems, Fort Lauderdale, Florida, Oct. 2004
  19. D.Liu and P.Ning, Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, NDSS' 03,2003
  20. D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
  21. D.Liu and P.Ning, Establishing pairwise keys in distributed sensor networks, ACM CCS 2003, Oct.2003
  22. D.Malan, M.Welsh and M.D.Smith, A Public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, IEEE SECON2004
  23. S.Marti, T.J.Giuli, K.Lai and M.Baker, Mitigating routing behavior in mobile ad hoc networks, Annual Internation Conference on Mobile Computing and Networking, Aug.2000
  24. A.Mishra, K.Nadkarni, and A.Patcha, Intrusion detection in wireless ad hoc networks, IEEE Wireless Communications, February 2004, pp.48-60
  25. A.Perrig, R.Canetti, D.Song and D.Tygar, Efficient and secure authentication for multicast, NDSS' 01, Feb.2001
  26. A.Perrig, J.Stankovic and D. Wagner, Security in wireless sensor networks, Commun. Of ACM, 47(5),June 2004, pp.5357
  27. A.Perrig, R.Szewczyk, J.D. Tygar, V.Wen and D.Culler, SPINS: Security protocols for sensor networks, Wireless Networks 8, Kluwer Academy Publishers, 2002, pp.521534 https://doi.org/10.1023/A:1016598314198
  28. J.Polastre, R.Szewczyk and D.Culler, Telos: enabling ultra-low power wireless research, Application notes 002, www.moteiv.com
  29. B.Przydatek, D.Song and A.Perrig, SIA:secure information aggregation in sensor networks, SenSys' 03, Nov.2003
  30. M.Tubaishat and S.Madria, Sensor networks: An overview, IEEE Potentials, April/May 2003, pp. 20-23
  31. D.Wagner, Resilient aggregation in sensor networks, Proc, of 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN'04), pp. 78-87, ACM Press, 2004
  32. J.P.WaIters, Z.Liang, W.Shi and V.Chaudhary, Wireless sensor network security: a survey, http//www. cs. wayne.edu/>weisong/pa pers/walters05-wsn-securitysurvey.pdf
  33. R.Watro, D.Kong, S.Cuti, C.Gardiner, C.Lynn and P.Kruus, TinyPK : Securing networks with public key technology, SASN '04, pp. 59-64, ACM Press, 2004
  34. A. D. Wooel and J.A.Stankovic, Denial of service in sensor networks, IEEE Computer, October 2002, pp. 54-62
  35. P-W. Yau and C.J.Mitchell, Reputation systems for routing security for mobile ad hoc networks, Sym.TIC' 03, Oct.2003
  36. S.Zhu, S.Setia, and S.J.Ajodia, LEAP: Efficient security mechanisms for large-scale distributed sensor networks, ACM CCS 2003, pp. 62-72.