무선 센서 네트워크를 위한 강한 익명성 지원 구조

A Strong Anonymity Scheme for Wireless Sensor Networks

  • 이중현 (전북도청 홍보기획과(인터넷홍보)) ;
  • 김태연 (서남대학교 컴퓨터정보통신학과) ;
  • 조기환 (전북대학교 컴퓨터공학부(영상정보신기술연구센터))
  • 투고 : 2009.10.28
  • 심사 : 2010.03.26
  • 발행 : 2010.06.30

초록

기존의 센서 네트워크 보안에 대한 연구는 인증과 비밀성, 무결성, 이용성 등을 제공하는 보안 서비스에 관심이 집중되어 왔으나 최근 센서 노드의 실제 ID의 노출 문제에 대한 관심이 증가하고 있다. 센서 노드의 실제 ID가 외부 공격자에게 노출되는 것을 방지하기 위해서는 실제의 ID를 사용하지 않고 동적인 가명을 사용하는 것이 일반적이다. 그러나 가명을 생성하는데 사용되는 비밀키(또는 해쉬키)와 현재의 가명(또는 난수)이 공격자에게 노출되었을 경우에 공격자는 쉽게 가명을 생성하는 문제가 발생한다. 본 논문에서는 센서 노드들에 대한 강한 익명성이 보장되는 구조를 제안한다. 제안된 구조는 가명을 생성하는데 사용되는 비밀정보들이 공격자에게 공모되었다고 하더라도 공격자가 해당 노드의 가명 ID들을 생성할 수 있는 확률이 매우 낮다. 그리고 보안 분석을 통해 제안된 구조가 무선 센서 네트워크에 적합함을 증명한다.

In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

키워드

참고문헌

  1. L. Eschenauer, and V. D. Gligor, "A Key-management Scheme for Distributed Sensor Networks," in Proc. on 9th ACM Conference on Computer and Communications Security, pp.41-47, 2002.
  2. T. Kim, K. Wang, and K. Cho, "A Secure Key Agreement Scheme in Low-energy Wireless Sensor Networks," Lecture Notes in Computer Science 4096(EUC 2006), pp.78-88, 2006.
  3. H. Chan, A. Perrig, and D. Song, "Random Key Pre-distribution Schemes for Sensor Networks," in Proc. on IEEE Symposium on Research in Security and Privacy, May, 11-14, pp.197-213, 2003.
  4. K. Mehta, D. liu, and M. Wright "Location Privacy In Sensor Networks Against A Global Eavesdropper," in Proc. on IEEE Conference on Network Protocols (ICNP 2007), 2007.
  5. Y. Hu and H. J. Wang, " A Framework for Location Privacy in Wireless Networks," in Proc. on ACM SIGCOMM Asia Workshop 2005, April 12-14, 2005.
  6. A. Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, and K. Jones, " On Anonymity in Wireless Sensor Networks," in Proc. on Tenth International Conference of Parallel and Distributed Systems," 2004.
  7. S. Misra and G. Xue, "Efficient Anonymity Schemes for clustered Wireless Sensor Networks," International Journal of Sensor Networks, vol. 1, no. 1/2, pp.50-63, 2006. https://doi.org/10.1504/IJSNET.2006.010834
  8. R. Blom, "An Optimal Class of Symmetric Key Generation System," Advances in Cryptology: in Proc. on EUROCRYPT 84, lecture Notes in Computer Science, Springer-Verlag, pp.335-338, 1985.
  9. Y. Ouyang, Z. Le, Y. Xu, N. Triandopoulos, S. Zhang, J. Ford, and F. Makedon, "Providing Anonymity in Wireless Sensor Networks," in Proc. on 10th Conference on Parallel and Distributed Systems (ICPADS 2004), 7-9. July 2004.
  10. S. Zhu, S. Setia, and S. Jajodia, "Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A probabilistic Approach," in Proc. on 11th IEEE International Conference on Network Protocols (ICNP'03), pp.1-10, 2003.
  11. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks," in Proc. on ACM Conference on Computer and Communications Security (CCS'03) pp.42-51, 2003.
  12. J. Kong and X. Hong, "ANODR: ANonymous On Demand Rounting with Untraceable routes for mobile ad-hoc networks," in Proc. on 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp.291-302, 2003.
  13. C. Karlof, N. Sastry and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," Second International Conference on Embedded Networked Sensor Systems, SenSys'04, Baltimore, MD, pp.162-175, 2004.