DOI QR코드

DOI QR Code

융합망 환경에서 D-MAC의 보안 특성

Security Characteristics of D-MAC in Convergence Network Environment

  • 홍진근 (백석대학교 정보통신학부)
  • Hong, Jinkeun (Div. of Information and Communication, Baekseok University)
  • 투고 : 2014.10.21
  • 심사 : 2014.12.20
  • 발행 : 2014.12.28

초록

융합망에 사용되는 D-MAC 프로토콜은 사물간 무선링크를 연결하기 위해 설계된 프로토콜이다. 이 프로토콜은 이웃 노드 가운데 로컬 데이터 교환과 수집을 위해 제공되고, 싱크로부터 센서 노드로 제어패킷과 관심 패킷이 분배된다. 본 논문에서는 융합망의 D-MAC 보안 인증 적용 여부에 따른 전력소모 효율성에 대해 분석하였다. 인증기법이 MAC 통신에 적용될 경우, 인증처리 유무에 따라 프리앰블의 에너지 소비 여부가 연관이 된다. 인증이 적용될 경우 서비스 공격에 대응하여 에너지 소비가 감소된다. 향후 보안 인증기법에 관련한 연구를 수행할 계획이다.

D-MAC protocol is used convergence network, which is designed to connect wireless link between things. This protocol is supported to local data exchange and aggregation among neighbor nodes, and distributed control packet from sink to sensor node. In this paper, we analysis about efficiency of power consumption according to whether or not security authentication of D-MAC in convergence network. If authentication scheme is applied to MAC communication, it is related to power consumption of preamble whether or not with and without authentication process. It is reduced to energy consumption against denial attack of service, when it is applied to authentication. Future work will take the effort to deal with security authentication scheme.

키워드

참고문헌

  1. Eoin O'Connell, Brenda O'Flynn, David Boyle, Energy & Reliability optimal MAC for WSNs, DRCN2014, pp.1-8, 2014.
  2. Mahendra Ram, Sushil Kumar, Analytical energy consumption model for MAC protocol in wireless sensor network, SPIN2014, pp.444-447, 2014.
  3. Saylee S. Thorat, S. D. Markande, Reinvented fuzzy logic secure media access control protocol to improve lifespan of wireless sensor networks, ICICT2014, pp.344-349, 2014.
  4. Cristina Cano, David Malone, Boris Bellalta, Jaume Barcelo, On the improvement of receiver initiated MAC protocols for WSN by applying scheduling, WoWMoM2013, pp.1-3, 2013.
  5. Mouzehkesh Nesa, Zia Tanveer, Shafigh Saman, Zheng Lihong, $D^2MAC$: dynamic delayed medium access control protocol with fuzzy technique for wireless body area networks, BSN2013, pp.1-6, 2013.
  6. Messaoud Doudou, Mohammad Alaei, Djamel Djenouri, Jose M. Barcelo ordinas, Nadjib Badache, Duo MAC: energy and time constrained data delivery MAC protocol in wireless sensor networks, IWCMC2013, pp.424-430, 2013.
  7. Afraa Attiah, Mustafa Ilhan Akbas, Mainak Chatterjee, Damla Turgut, EE-MAC: energy efficient sensor MAC layer protocol, LCN2013, pp.116-119, 2013.
  8. Wei Shen, Tingting Zhang, Filip Barac, Mikael Gidlund, PriorityMAC: A priority enhanced MAC protocol for critical traffic in industrial wireless sensor and actuator networks, IEEE transactions on industrial informatics, Vol.10, No.1, pp.824-835, Feb. 2014. https://doi.org/10.1109/TII.2013.2280081
  9. Xiuming Zhu, Song Han, Pei Chi Huang, Aloysius K. Mok, Deji Chen, MBStar: A real time communication protocol for wireless body area network, ECRTS2011, pp.58-66, 2011.
  10. Vivek S. Deshpande, Dattatray S. Waghole, Performance analysis of FMAC in wireless sensor networks, WOCN2014, pp.1-5, 2014.

피인용 문헌

  1. A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service vol.6, pp.2, 2015, https://doi.org/10.15207/JKCS.2015.6.2.065