DOI QR코드

DOI QR Code

An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment

WSN 환경에서 안전한 데이터 전달을 위한 IDE 기반의 계층적 노드인증 프로토콜

  • 조영복 (충북대학교 컴퓨터과학과 네트워크 보안연구실) ;
  • 이상호 (충북대학교 소프트웨어학과)
  • Received : 2011.10.20
  • Accepted : 2012.03.18
  • Published : 2012.03.30

Abstract

In WSN environment, the sensor nodes collect sensed data, and transmit data to the BS. BS is difficult to trust the data from unauthenticated nodes. Therefore, many papers have been proposed about the node authentication and the safety of data. In the AM-E paper, data is delivered after node authentication. In this time, the sensor nodes are directly communicated to BS the AREQ/AREP message for authentication. Therefore, the sensor nodes consume more energy for authentication. Also, noes communicate directly with the BS for authentication will have problem due to the limited energy of nodes. In this paper, the same security with AM-E is supported, Furthermore, to minimize the energy consumption, IDE based hierarchical node authentication protocol is proposed. Compared with AM-E, the number of alive nodes is increased about 39%. Thus, the entire network life time is extended and energy efficiency is improved.

WSN 환경의 센서노드는 정보를 수집하고 베이스스테이션으로 전달한다. 베이스스테이션은 인증되지 않은 노드로부터 전달받은 데이터를 신뢰하기 어렵다. 따라서 다양한 방법으로 노드를 인증하고, 데이터의 안전성을 판단하는 방식들이 연구되고 있다. 기존 AM-E[12] 방식에서는 노드인증 후에 데이터를 전달한다. 이때 센서노드는 베이스 스테이션과 직접 AREQ/AREP 메시지를 통신하는 과정에서 인증메시지 송수신으로 인해 많은 에너지를 소비하게 된다. 또한 모든 노드는 인증을 위해 베이스스테이션과 직접 통신과정을 거치며 한정된 에너지를 과다하게 소비하는 문제점을 갖는다. 따라서 이 논문에서는 AM-E 방식과 동일한 보안성을 제공하면서 센서노드의 에너지소비를 최소화할 수 있는 IDE 기반의 계층적 노드인증 프로토콜을 제안한다. 제안방법은 안전성 측면에서는 기존 방식과 같이 메시지 재전송공격이나 메시지의 무결성 보장을 유지하면서 통신에 참여하는 노드수가 AM-E 방식보다 약 39% 증가되어 전체 네트워크 생명주기를 연장함으로 에너지 효율성을 증가시켰다.

Keywords

References

  1. W. Ke, P. Basu, S. Abu Ayyash, and T.D.C. Little, "Attribute Based Hierarchical Clustering in Wireless Sensor Networks", MCL Technical Report No. 03-24-2003
  2. Seema Bandyopadhyay and Edward J. Coyle, "An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks", INFOCOM2003
  3. L.Eschenauer and V.D.Gligor, "A key management scheme for distrivuted sensor networks" In 9th ACM conference on computer and communications security , pp. 41-47, 2002
  4. A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Wireless Networks, Vol. 8. No. 5, pp. 521-534, 2002. https://doi.org/10.1023/A:1016598314198
  5. Q. Huang, J. Cukier, H. Kobauashi, B. Liu and J.Zhang, "Fast Authenticated Key Establishment Protocols for Self-organizing Sensor Networks", InProc. of the 2nd SCM International Conference on Wireless Sensor Networks and Applications, pp.141-150, 2003.
  6. S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks", In 10th ACM Conference on Computer and Communication Security(CCS), 2003.
  7. H. Chan, A. Perrig, "PIKE:Peer Intermediaries for Key Establishment in Sensor Networks", IEEE Infocom, Vol. 1, pp. 524-535, 2005.
  8. R.M.S. Silva, N.S.A.Pereira, M.S.Nunes, "Applicability Drawbacks of Probabilistic Key Management Schemes for Real World Applications of Wireless Sensor Networks",. Proceeding of the Third International Conference on Wireless and Mobile Communication(ICWMC'07), pp.51-58, 2007
  9. W. S. Juang, "Efficient User Authentication and Key Agreement in Wireless Sensor Networks", WISA 2007, LNCS 4298, pp. 15-29, Springer-Verlag, 2007.
  10. J.Ibriq and Imad Mahgoub, "A Hierarchical key establishment scheme or Wireless sensor networks", Proceedings of 21st International conference on advanced Networking and applications(AINA07), pp.210-219, 2007
  11. W. S. Juang, "Efficient User Authentication and KeyAgreement in Wireless Sensor Networks", WISA 2007, LNCS 4298, pp. 15-29, Springer-Verlag, 2007.
  12. T.T Huyen, Eui-Nam huh, "A reliable 2-mode authentication framework for Ubiquitous sensor network", Journal of Korean Society for Internet Information, 2008
  13. N. T.T. Huyen and E. Huh. "An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. In ICUIMC '08, page 441-447, 2008
  14. Sung-Hwa Hong and Byoung-Kug Kim,"Flooding Level Cluster-based Hierarchical Routing Algorithm For Improving Performance in Multi-Hop Wireless Sensor Networks", Journal of korea information and communications society, Vol 33,No3, pp pp123-134, 2008
  15. Boseung Kim, Huibin Lim,Jongseok Choi and Yongtae Shin,"A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN" Journal of The Institute of Electronics Engineers of Korea, Vol 48-CI, No2, pp 86-95, 2011