DOI QR코드

DOI QR Code

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method

클러스터 기반에서의 인증을 통한 안전한 키 관리 기법

  • 김진수 (인하대학교 정보공학과) ;
  • 최성용 (인하대학교 정보공학과) ;
  • 정경용 (상지대학교 컴퓨터정보공학부) ;
  • 류중경 (대림대학 컴퓨터정보과) ;
  • 임기욱 (선문대학교 컴퓨터정보학부) ;
  • 이정현 (인하대학교 컴퓨터공학부)
  • Published : 2009.09.28

Abstract

The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.

클러스터 기반의 라우팅 기법에서의 안전한 데이터 통신을 위해서는 기존의 키 관리 방식은 적합하지 않다. 왜냐하면 클러스터 기반에서는 매 라운드 마다 클러스터 헤드가 변경되기 때문에, 안전한 통신을 위해 각 멤버 노드들과 인증이나 공유키 설정 단계를 거쳐야 한다. 또한 기존의 키 관리 메커니즘에서는 대부분 센서 네트워크 안의 모든 노드에 대해 이동성을 부여하지 않았기 때문에, 노드의 이동성을 고려하게 되면 안전한 통신을 위한 커다란 오버 헤드가 발생한다. 따라서 본 논문에서는 이동성과 새로운 노드의 삽입이 빈번한 경우에도 안전하고 효율적인 클러스터 기반에 적합한 키 관리 메커니즘을 제안한다.

Keywords

References

  1. L. Eschenauer and V. D. Gligor, "A key management scheme for distributed sensor networks," In 9th ACM conference on Computer and communications security, pp.41-47, 2002. https://doi.org/10.1145/586110.586117
  2. W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key pre-distribution scheme for wireless sensor networks," ACM Transactions on Information and System Security, Vol.8, pp.228-258, 2005. https://doi.org/10.1145/1065545.1065548
  3. J. Hwang and Y. Kim, "Revisiting random key predistribution schemes for wireless sensor networks," In 2nd ACM workshop on Security of ad hoc and sensor networks, pp.43-52, 2004. https://doi.org/10.1145/1029102.1029111
  4. D. Liu, P. Ning, and R. Li, "Establishing pairwise keys in distributed sensor networks," ACM Transactions on Information and System Security (TISSEC), Vol.8, pp.41-77, 2005. https://doi.org/10.1145/1053283.1053287
  5. S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," In 10th ACM conference on Computer and communication security, pp.62-72. 2003. https://doi.org/10.1145/948109.948120
  6. S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach," In 11th IEEE International Conference on Network Protocols (ICNP'03), pp.326-335, 2003. https://doi.org/10.1109/ICNP.2003.1249782
  7. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, Vol.40,pp.102-114, Aug. 2002. https://doi.org/10.1109/MCOM.2002.1024422
  8. W. R. Heinzelman, A. P. Chandrakasan, and H.Balakrishnan,"Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Proc. 33rd Hawaii Int'l. Conf. Sys. Sci., 2000(1). https://doi.org/10.1109/HICSS.2000.926982
  9. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Commun.,Vol.1, No.4, pp.660-670, 2002(10). https://doi.org/10.1109/TWC.2002.804190
  10. J. S. Kim, S. Y. Choi, S. J. Han, J. H. CHoi, J. H Lee, and K. W. Rim, "Alternative Cluster Head Selection Protocol for Energy Efficiency in Wireless Sensor Networks," In First Software Technologies for Future Dependable Distributed Systems (STFDDS'09), pp.159-163, 2009(5). https://doi.org/10.1109/STFSSD.2009.15
  11. M. G. Sadi, D. S. Km, and J. S. Park, "GBR: Grid Based Random Key Predistribution for Wireless Sensor Network," Proceedings of the 11th Annual IEEE International Conference on Parallel and Distributed Systems(ICPADS '05), Vol.2, pp.310-314, 2005(7). https://doi.org/10.1109/ICPADS.2005.158
  12. J. Ibriq and Imad Mahgoub, "A Hierarchical Key Establishment Scheme or Wireless Sensor Networks," Proceedings of 21st International Conference on Advanced Networking and Applications(AINA'07), pp.210-219, 2007. https://doi.org/10.1109/AINA.2007.14
  13. R. M. S. Silva, N. S. A. Pereira, M. S. Nunes, "Applicability Drawbacks of Probabilistic Key Management Schemes for Real World Applications of Wireless Sensor Networks," Proceedings of the Third International Conference on Wireless and Mobile Communications (ICWMC'07), 2007. https://doi.org/10.1109/ICWMC.2007.24
  14. T. Moore, "A Collusion Attack on Pair-wise Key Predistribution Schemes for Distributed Sensor Networks," Proceedings of the Fourth Annual IEEE International Conference Pervasive Computing and Communications Workshops (PERCOMW06), pp.13-17, 2006(3). https://doi.org/10.1109/PERCOMW.2006.3
  15. C. Hartung, J. Balasalle and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS-990-05, 2005(1).