DOI QR코드

DOI QR Code

Security Issue in T-MAC Communication Protocol

T-MAC 통신 프로토콜에서 보안 이슈

  • Hong, Jin-Keun (Division of Information Communication, Baekseok University)
  • 홍진근 (백석대학교 정보통신학부)
  • Received : 2010.10.18
  • Accepted : 2010.12.17
  • Published : 2010.12.31

Abstract

Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

본 T-MAC 프로토콜은 WSN을 위해 설계된 잘 알려진 MAC 프로토콜이다. 본 논문에서 우리는 T-MAC 보안 취약성을 살펴보고 DoS 취약성과 재연공격에 대한 취약성과 관련하여, T-MAC 각 단계별 소모하는 전력을 분석하였다. 분석된 결과로부터 일반적인 T-MAC 통신을 위한 신뢰성, 효율성, 보안을 제공하는 전력에 효율적인 인증기법의 필요성을 고려하였다. 이 연구는 T-MAC 통신에 전력 소비 및 DoS 취약성 사례 연구에 관한 것이다.

Keywords

References

  1. W. Ye, J. Heidemann, and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," IEEE INFOCOM'02, pp.1567-1576, 2002.
  2. P. Lin, C. Qiao, and X. Wang, "Medium Access Control with A Dynamic Duty Cycle for Sensor Networks," IEEE WCNC'04, pp.1534-1539, 2004.
  3. J. deng, R. Han, and S. Mishra, "A Robust and Light-Weight Routing Mechanism for Wireless Sensor Netowkrs," DIWANS'04, 2004.
  4. W. Lee and H. S. Lee, "Analysis of a Global Synchronization Algorithm in Wireless Sensor Networks," IEEE MFI'08, pp.20-25, 2008.
  5. S. Sung, H. Kang, E. Kim, and K. Kim,, "Energy Consumption Analysis of S-MAC Protocol in Single-Hop Wireless Sensor Networks," IEEE, 2006.
  6. T. V. Dam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," ACM SenSys'03, pp.171-180, 2003.
  7. H. Y. Lee and T. H. Cho, "Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks," IEICE Trans. Commun., Vol.E90-B, No.12, pp.3346-3353, 2007. https://doi.org/10.1093/ietcom/e90-b.12.3346
  8. G. Xing et al., "Towards Unified Radio Power Management for Wireless Sensor Networks," Wireless Communications and Mobile Computing, Vol.9, Issue 3, pp.31-323, 2008.
  9. H. Wang, "A Robust Mechanism for Wireless Sensor Network Security," IEEE WiCom'08, pp.1-4, 2008.
  10. X. Lu, M. Spear, K. Levitt, and S. F. Wu, "A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols," IARIA SECURWARE'08, pp.403-411, 2008.