DOI QR코드

DOI QR Code

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption

Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안

  • 임슈윤 (동서대학교 디자인&IT 전문대학원) ;
  • 푸천친 (동서대학교 디자인&IT 전문대학원) ;
  • 임효택 (동서대학교 컴퓨터정보공학부) ;
  • 이훈재 (동서대학교 컴퓨터정보공학부)
  • Published : 2007.08.31

Abstract

In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

센서 네트워크에서는 다양하고 폭 넓은 응용 프로그램을 위해서 경제적으로 실행 가능한 모니터링 솔루션을 제공한다. 대부분의 연구에서는 값싼 노드들을 겨냥해서 연구가 진행된다. 센서 네트워크들이 노출되는 보안위협들과 맞서기 위해서, 암호 프로토콜은 센서 노드들 사이에서 점대점 암호화 방식으로 암호화를 실행한다. 알려진 파괴와 속임 위협들은 전송시에 데이터를 암호화 하는 것과 동시에 데이터 소스를 인증하는 것에 의해서 막을 수 있다. 제한된 자원을 가진 노드들에서 저 전력 장치들에게 효과적이라고 알려진 대칭키 알고리즘이 사용된다. 데이터보호는 Dragon Stream Cipher 대칭키 암호화와 새롭게 디자인된 Dragon-MAC Message Authentication Code를 짜 넣는 것에 의한 방법에 의해서 완전하게 된다. 제안된 알고리즘은 MAC 알고리즘에 의해서 요구되는 동작 계산값을 최소화 하기 위한 목적으로써 Dragon Stream Cipher을 기초로 한 계산된 몇몇의 데이터를 사용하기 위해서 디자인 되었다. 빠른 키 스트림 생성을 가진 문자 기반의 Stream Cipher 인 Dragon을 목표로 하여, 한정된 환경에 적합하다. 무선센서 노드에서 권한 암호화의 이행을 통한 실제 인증과 메시지 인증을 겨냥해서 우리의 프로토콜은 계획되었다.

Keywords

References

  1. Chris Karlof, Naveen Sastry, David Wagner, 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2(04), Baltimore, MD, November 2004
  2. K. Chen, M. Henricksen, W. Millan, J. Fuller, L. Simpson, E. Dawson, H. Lee, and S. Moon. 'Dragon: A fast word based stream cipher'. ECRYPT Stream Cipher Project Report 2005/006
  3. Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander Dean, Frank Mueller and Mihail Sichitiu, 'Analyzing and Modeling Encryption Overhead for Sensor Network Nodes' Workshop on Wireless Sensor Networks and Applications (WSNA'03) with MobiCom'03, Sep 2001
  4. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, 'SPINS: Security Protocols for Sensor Networks', Proceedings of 7th Annual International Conference on Mobile Computing and Networks (MOBICOM 2001), Rome, Italy July 2001
  5. Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynnl and Peter Kruus, 'TinyPK: Securing Sensor Networks with Public Key Technology', Workshop on Security of ad hoc and Sensor Networks, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington DC, USA 2004
  6. C.N. Zhang and Q. Yu, 'An RC4 based Light Weight Secure Protocol for Sensor Networks', from proceeding on Wireless and Optical Communication Multi Conference 2006
  7. R. Rivest, 'The RC5 encryption algorithm', in Proceedings of the 1994 Leuven Workshop on Fast Software Encryption, pages 86-96, Springer-Verlag, 1995
  8. B. Zoltak, 'An Efficient Message Authentication Scheme for Stream Ciphers', Cryptology ePrint Archive 2004
  9. M. Bellare and C. Namprempre, 'Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm', Lecture Notes in Computer Science Vol. 1976, T. Okamoto ed, Springer-Verlag, 2000
  10. B. Schneier, 'Applied Cryptography', Second edition, John Wiley & Sons, 1996
  11. National Institute of Standards and Technology, 'SKIPJACK and KEA Algorithm Specifications', ver. 2, 29 May 1998
  12. TIP7xxCM Series Manual'. Version 1.2, Available at http://www.maxfor.co.kr/eng/
  13. Germano Guimaraes, Eduardo Souto, Djamel Sadok, Judith Kelner, 'Evaluation of Security Mechanisms in WirelessSensor Networks,' icw, pp. 428-433, Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05), 2005
  14. Harald Vogt, 'Exploring Message Authentication in Sensor Networks,' 1st European Workshop on Security in Ad Hoc and Sensor Networks (ESAS 2004)