DOI QR코드

DOI QR Code

6LoWPAN 단편화 패킷 재전송에 따른 암호화 알고리즘 성능 분석

Performance Evaluation of Cryptographic Algorithms for the 6LoWPAN with Packet Fragmentations

  • 김현곤 (목포대학교 정보보호학과)
  • Kim, Hyun-Gon (Dept. of Information Security, Mokpo National University)
  • 투고 : 2011.03.07
  • 심사 : 2011.05.09
  • 발행 : 2011.08.31

초록

본 논문에서는 무선 구간에서 패킷 손실을 최소화 할 수 있는 재전송 기법과 기밀성 제공을 위해 암복호화 알고리즘을 적용한 6LoWPAN 프로토콜을 MICAz 센서에 구현하고 실험적인 성능을 분석하였다. 재전송 기법에서는 재생공격을 방지하기 위한 단편화 패킷 순서번호, 타임 스템프, 난스, 체크섬을 구현하였으며, 패킷 기밀성과 무결성을 제공하기 위해 AES, 3DES, SHA2, SHA1 알고리즘을 구현하였다. 실험 결과에 의하면 전송에러가 높아질수록 즉, 패킷 손실이 높아질수록 재전송이 급격하게 증가하고, 홉 수가 증가함에 따라 재전송이 비례적으로 증가함을 알 수 있었다. 그리고 암복호화 수행 시간이 재전송 처리 시간보다 상대적으로 크다는 것을 알 수 있었다.

In this paper we implement a 6LoWPAN protocol on the MICAz sensor platform, which could minimize packet re-transmission, and support security primitives for packet integrity and confidentiality. And we also present a performance evaluation of the implemented protocol calculated according to the cryptographic algorithms. In the re-transmission method, time stamp, nonce, and checksum are considered to protect replay attacks. As cryptographic algorithms, AES, 3DES, SHA2, and SHA1 are implemented. If transmission errors (thus, packet losses) and the number of hops are increase then, packet re-transmissions are increase exponentially from the experimental results. Also, the result shows that cryptographic operations take more time than packet re-transmission time.

키워드

참고문헌

  1. G G. Montenegro, N. Kushalnager, etc,. "Transmis sion of IPv6 Packets over IEEE 802.15.4 Networks, "IETF RFC4944, Sept. 2007.
  2. IETF, "IPv6 over Low power WPAN(6LowPAN), " http://www.ietf.org
  3. IEEE, "IEEE std. 802.15.4-2003, "IEEE Computer Society, Oct. 2003.
  4. IEEE, "802.15.4Wireless MediumAccess Control (MAC) and Physical Layer(PHY) Specifications for Low-Rate Wireless Personal Area Networks (LRWPANs), "IEEE Computer Society, September 2003.
  5. S. Diniel Park, K. Kim, E. Seo, S. Charkrabarti, "IPv6 over Low Power WPAN Security Analysis, "IETF draft-danie -6lowpan-security- analysis-02 .txt, June 2006.
  6. G. P. Chandranmenon and G. Varghese, "Reconsid ering fragmentation and reassembly, "17th ACM SIGACT -SIG OPS Symposiumon Priciples of Distrubuted Computing, 1998.
  7. HyunGon Kim, "A Secure 6LoWPAN Re-transmission Mec hanism for Packet Fragmentation against Replay Attacks, "Korea Society of Computer Information, Vol. 14, pp.101-110, Oct. 2009.
  8. P. Thubert, J. Hui, "LoWPAN Fragment Fowarding and Recovery, "IETF draft draft-thubert-6lowpa n-simple-frag ment-recovery-07.txt, June 2010.
  9. Wiki page of 6LoWPAN, http://smote.cs.berkeley.edu:8000/t racenv/wiki/b6loWPAN, the wiki-site of 6LoWPAN.
  10. Hui, J. W. and Culler, D. E., "IP is dead, long live IP for wireless sensor networks, "In Proceeding of the 6th ACM Conference on Embedded Network Sensor Systems, pp.15-28, Nov. 2008.
  11. http://sics.se/projects/sicslowpan
  12. Wei Liu, Rong Luo, Huazhong Yang, "Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks, "WRI International Conference on Communications and Mobile Computing, vol. 3, pp.496-501, 2009.
  13. P. Ganesan, R. Venugopalan etc., "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes, "WSNA 03, Sept. 2003.
  14. R. Venugopalan, P. Ganesan etc., "Encryption Ove rhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis, "CASES, pp.188-197, Oct. 2003.
  15. R. Silva, J. S. Silva, F. Boavida, "Evaluating 6Lo WPAN Implementations in WSNs, "In Proceeding of the 9th Conference on Computer Networks, pp.15-16, Oct. 2009.
  16. J. Granjal, R. Silva, E. Monteiro, J. Silva, F. Boav ida, "Why is IPSec a viable option for Wireless Sensor Networks, "Proceedings of WSNS 2008, pp.802-807, Sept. 2008.