정적 무선 센서 네트워크를 위한 강한 연결성을 가진 계층적 그리드 기반의 키 선분배 기법

Strongly-Connected Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Static Wireless Sensor Networks

  • Nyang Dae-Hun (Graduate School of Information Technology and Telecommunication, Inha University) ;
  • Abedelaziz Mohaisen (Graduate School of Information Technology and Telecommunication, Inha University)
  • 발행 : 2006.07.01

초록

무선 센서 네트워크(Wireless Sensor Network, WSN)는 작고 값이 싸지만 매우 제한된 자원을 가진 많은 수의 센서로 구성된다. 이러한 자원의 부종으로 인하여 공개키 암호화방식은 WSN에 사용하기 적합하지 않으며, 비밀키 암호화방식을 적용시키기 위하여는 키 관리와 선분배 기법이 필요하다. 많은 키 선분배 기법이 제안되었지만 대부분의 이러한 기법은 실제 WSN의 환경을 충분히 고려하지 않고 있다. 이 논문에서는 적당한 통신량과 연결을 고려한 WSN을 위하여 계층적 그리드(Grid)를 기반으로 하는 보안 프레임워크를 제안한다. 프레임워크의 보안성을 검증하기 위하여 간단한 키 개체 분배 기법을 적용하였으며, WSN에서 가능한 보안 위협에 대하여 분석하였다.

Wireless Sensor Network(WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but most of-them didn't consider the real WSN assumptions, In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.

키워드

참고문헌

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey, Computer Networks (Elsevier) Journal, Vol. 38, No. 4, pp. 393-422, March 2002 https://doi.org/10.1016/S1389-1286(01)00302-4
  2. Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography, Proceedings EUROCRYPT 84, LNCS, Springer-Verlag, 209, pp. 335-338, 1985
  3. Blundo, C., DE Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M.: Perfectly secure key distribution for dynamic conferences,' In Advances in Cryptology - CRYPTO '92, LNCS 740, pp. 471-486, 1993
  4. Camtepe, S. A. Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Surve,. Rensselaer Polytechnic Institute RPI, Technical Report TR-05-07, (March 23, 2005)
  5. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003
  6. Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644-654, November 1976 https://doi.org/10.1109/TIT.1976.1055638
  7. Du, W., Deng, J., Han, Y. S., and Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS'03), pp. 42-51, 2003 https://doi.org/10.1145/948109.948118
  8. Eschenauer, L., Gligor, V. D.: A key management scheme for distributed sensor networks, In Proceeding of the $9^{th}$ ACM Conf. on Computer and Communications Security, pp. 41-47, 2002 https://doi.org/10.1145/586110.586117
  9. Huang, D. , Mehta, M., Mehdi, D, Harm, L.: Location-aware Key Management Scheme for Wireless Sensor Networks, Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), pp. 29-42, October 2004 https://doi.org/10.1145/1029102.1029110
  10. Hwang, J. M., Kim, Y. D.: Revisiting random key pre-distribution schemes for wireless sensor networks, Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43-52, 2004 https://doi.org/10.1145/1029102.1029111
  11. Li, J., Janotti, J., DeCouto, D. S. J. , Karger, D. R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing, The Sixth Annual International Conf. on Mobile Computing and Networking, pp. 120-130, August 2000 https://doi.org/10.1145/345910.345931
  12. Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communi-cations Security (CCS'03), pp. 52-61, 2003 https://doi.org/10.1145/948109.948119
  13. McCune, J., Shi, E., Perrig, A., Reiter, M.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts, In Proceedings of the IEEE Symposium on Security and Privacy, May 2005 https://doi.org/10.1109/SP.2005.7
  14. Newsome, J., Shi, E., Song D., Perrig A.: The Sybil Attack in Sensor Networks: Analysis and Defense., In Proceedings of Information Processing in Sensor Networks (IPSN), April 2004 https://doi.org/10.1109/IPSN.2004.1307346
  15. Parno, B., Perrig, A., and Gligor V.: Distributed Detection of Node Replication Attacks in Sensor Networks, Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005 https://doi.org/10.1109/SP.2005.8
  16. Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., Tygar, J. D.: SPINS: security protocols for sensor networks, MOBICOM, pp. 189-199, 2001 https://doi.org/10.1145/381677.381696
  17. Rivest, R. L., Shamir, A., Adleman, L. M: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2): pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
  18. Schmidt, JS. , Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks, Security in Ad-hoc and Sensor Networks, LNCS 3313, pp 166-177, Springer-Verlag Berlin Heidelberg 2005
  19. Wood, A.,Stankovic, J. A.: Denial of Service in Sensor Networks, IEEE Computer, 35(10): pp. 54-62, October 2002 https://doi.org/10.1109/MC.2002.1039518