DOI QR코드

DOI QR Code

전술 Ad-hoc 네트워크에서 하이브리드 키 관리 기법

A Hybrid Key Management Scheme in Tactical Ad-hoc Network

  • 이윤호 (국방대학교 국방정보체계학과) ;
  • 이수진 (국방대학교 국방정보체계학과)
  • 투고 : 2011.10.12
  • 발행 : 2011.11.30

초록

차세대 전술통신체계인 TICN은 대용량, 고속 및 원거리 우선 통신을 위해 설계되었다. 특히 전장에서의 이동성 보정을 위해 무선 통신이 가능한 애드혹 네트워크 기술 적용을 고려하고 있다. 애드혹 네트워크에서 기밀성, 무결성 및 인증을 보장하기 위한 키 관리 기법은 매우 중요하다. 본 논문에서는 TICN과 같은 전술 애드혹 네트워크의 계층적 특성을 고려한 새로운 하이브리드 키 관리 기법을 제안한다. 즉, 충분한 에너지와 계산능력을 갖춘 상위계층 노드에서는 PKI 기반의 키 관리 기법을 적용하고, 반면 상대적으로 제한된 에너지를 가지는 하위계층에서는 에너지 효율성을 보장하기 위해 위치기반의 인증을 통한 새로운 키 관리 기법을 제안한다.

A next generation military communication system called Tactical Information Communication Network(TICN) is designed to advance into large capacity, high speed, and long distance wireless relay transmission. To support mobility in battlefield, the application of Ad-hoc networking technology to its wireless communication is being considered. In Ad-hoc network, the key management technique is very important to ensure the confidentiality, integrity, and authentication. In this paper, we propose a new hybrid key management scheme considering the hierarchical characteristics of the tactical ad-hoc such as TICN. For upper layer with sufficient energy and computation capability, we apply PKI based key management scheme. For lower layer with restricted resources, we propose a new key management scheme using the location-based authentication to ensure the energy efficiency.

키워드

참고문헌

  1. A. M. Hegland, E. Winjum, S.F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, "A survey of key management in ad hoc networks" IEEE Communications Surverys & Tutorials, 3rd Quarter 2006
  2. M. Bohge, and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks", In ACM workshop on Wireless Security, 2003
  3. Y. Cheng, D.P. Agrwal, "An improved key distribution mechanism for large-scale hierachical wireless sensor networks," Journal of Ad Hoc Networks, vol. 5, pp. 35-48, 2007 https://doi.org/10.1016/j.adhoc.2006.05.011
  4. A. Shamir, "How to Share a Secret," Communication of ACM, vol. 22, pp.612-613 Nov. 1979 https://doi.org/10.1145/359168.359176
  5. L. Zhou and Z.J. Haas, "Securing Ad Hoc Network," IEEE Networking Mag., vol.13, pp.24-30, Nov. 1999
  6. S. Yi and R. Kravets, "MOCA: MObile Certificate Authority for Wireless Ad Hoc Networks," in Proceedings of 2nd Annual PKI Research Workshop, pp. 65-79, April, 2003
  7. B. Wu, J. Wu, E.B. Femandez, M. Dyas, S. Magliveras, "Secure and efficient key management in mobile ad hoc network," Journal of Network and Computer Applications, vol 30, pp. 937-954, August 2007 https://doi.org/10.1016/j.jnca.2005.07.008
  8. S. Zhu, S. Setia, and S.Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proceeding of CSS'03, 2003
  9. L. Eschenauer, and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," in Proceeding of 9th ACM conference on CCS, Nov. 2002
  10. H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," IEEE Symp. Security and Privacy, pp. 197-213, 2003
  11. W. Du, 1. Deng, Y.S. han, S. Chen, and P. Varshney, "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowlege," in Proceeding of IEEE INFOCOM, pp. 586-597, 2004
  12. J. Lee, T. Kwon, and J. Song, "Location-Aware Key Management using multi-layer grids for WSN," Applied Cryptography and Network Security '06, LNCS 3989, pp. 390-404, 2006
  13. M. Puzar, J. Andersson, T. Plagemann, Y. Roudier, "SKiMPy; A Simple Key Management Protocol for MANETs in Emergency and Rescure Operations," in Proceeding of ESAS '05, 2005
  14. M. Bouassida, I. Chrisment, and o. Festor, "Group Key Management in MANETs," International Journal of Network Security, Vol.6, No.1, pp. 67-79, Jan. 2008
  15. I. Chuang, W. Su, C. Wu, J. Hsu and Y. Kuo, "Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks," in Proceedings of IEEE Wireless Communications and Networking Conference, pp.4145-4150, March 2007
  16. 박귀순, 황정섭, "미래 전장 환경변화에 따른 TICN 체계 요구 기능 및 능력," Telecommunications review, 제 20권 2호,pp.196-206, 4월, 2010년.