An efficient Broadcast Authentication Scheme for Wireless Sensor Networks

무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안

  • Moon Hyung-Seok (Department of Information and Telecommunication Engineering, Graduate School of Hankuk Aviation University) ;
  • Lee Sung-Chang (School of Avionics and Telecommunications, Hankuk Aviation University)
  • 문형석 (한국항공대학교 대학원 정보통신공학과) ;
  • 이성창 (한국항공대학교 항공전자 및 정보통신공학부)
  • Published : 2006.06.01

Abstract

It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.

자원 제한적인 노드들로 구성되는 무선 센서 네트워크의 보안 알고리즘은 짧은 패킷 길이와 메모리, 컴퓨팅 능력, 전력 등의 자원 문제 때문에 기존의 보안 알고리즘을 적용하기가 힘들다. 주로 센서의 자원 사용이 상대적으로 덜하고, 키 길이가 짧은 공유키 기반의 알고리즘이 많이 사용되고 있지만 베이스스테이션의 브로드캐스트 패킷에 대한 인증을 위해서 단순히 전체 노드가 동일한 공유키를 가지는 방식은 적합하지 못하다. 최근 센서 네트워크에 적합한 형태의 브로드캐스트 인증 알고리즘으로, one-way 해쉬 함수를 이용한 키 체인생성과 키 체인의 각 키를 이용한 Message Authentication Code 생성, 지연된 키 공개를 이용한 알고리즘이 제안 되었다. 이러한 방식은 무선 센서 네트워크 환경에 적합한 인증 방식을 제공하지만 브로드캐스트 율, 키 체인 레벨 등, 네트워크의 각 조건에 따라 비효율적인 결과를 초래하기도 한다. 본 논문에서는 키 체인 링크 및 주기적 키 공개 방식을 이용하여 낮은 인증 딜레이를 보장하며, 패킷 송수신량과 수신 노드의 메모리 및 컴퓨팅 리소스를 효율적으로 사용할 수 있도록 개선된 브로드캐스트 인증 알고리즘을 제안하고, TinyOS의 TOSSIM으로 그 성능을 검증한다.

Keywords

References

  1. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar, 'SPINS: Security Protocols for Sensor Networks', In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, Rome, Italy, July 2001 https://doi.org/10.1145/381677.381696
  2. Adrian Perrig, R. Canetti, Briscoe, J.D. Tygar, and D. Song, 'TESLA:Multicast source authentication transform'. IRTF draft, draft-irtf-smugtesla-00.txt, November, 2000
  3. Donggang Liu, Peng Ning, 'Multi-Level ${\mu}$ TESLA: A Broadcast Authentication System of Distributed Sensor Networks', ACM Transaction on Embedded Computing Systems (TECS), vol 3, No 4, pages 800-836, November, 2004 https://doi.org/10.1145/1027794.1027800
  4. Philip Levis, Nelson Lee, Matt Welsh, and David Culler, 'TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications', Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), November, 2003 https://doi.org/10.1145/958491.958506
  5. Chris Karlof, Naveen Sastry, and David Wagner, 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks'. Proceedings of the 2nd international conference on Embedded networkds sensor systems, pages 132-175, November, 2004
  6. Kris S. J. Pister,. Joe M. Khan, Bernhard E. Boser, 'Smart Dust: Wireless Networks of Millimeter-Scale Sensor Nodes', Highlight Article in 1999 Electronics Research Laboratory Research Summary. 1999
  7. Chris Karlof, David Wagner, 'Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures', Proceedings for the first IEEE International Workshop on Sensor Network Protocols and Applications (SNPA 2003), pages 113 -127, May, 2003 https://doi.org/10.1109/SNPA.2003.1203350
  8. Adrian Perrig, Rand Canetti, Dawn Song and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast', Proceedings of Network and Distributed System Security Symposium. San Diego, California, February, 2001