DOI QR코드

DOI QR Code

Key Re-distribution Scheme of Dynamic Filtering Utilizing Attack Information for Improving Energy Efficiency in WSNs

무선 센서 네트워크에서 에너지 효율성 향상을 위해 공격정보를 활용한 동적 여과 기법의 키 재분배 기법

  • Park, Dong-Jin (College of Software, Sungkyunkwan University) ;
  • Cho, Tae-Ho (College of Information and Communication Engineering, Sungkyunkwan University)
  • 박동진 (성균관대학교 소프트웨어플랫폼학과) ;
  • 조대호 (성균관대학교 전자전기컴퓨터학과)
  • Received : 2016.01.15
  • Accepted : 2016.04.20
  • Published : 2016.04.25

Abstract

Wireless sensor networks are vulnerable to an adversary due to scarce resources and wireless communication. An adversary can compromise a sensor node and launch a variety of attacks such as false report injection attacks. This attack may cause monetary damage resulting in energy drain by forwarding the false reports and false alarms at the base station. In order to address this problem, a number of en-route filtering schemes has been proposed. Notably, a dynamic en-route filtering scheme can save energy by filtering of the false report. In the key dissemination phase of the existing scheme, the nodes closer to the source node may not have matching keys to detect the false report. Therefore, continuous attacks may result in unnecessary energy wastage. In this paper, we propose a key re-distribution scheme to solve this issue. The proposed scheme early detects the false report injection attacks using initially assigned secret keys in the phase of the key pre-distribution. The experimental results demonstrate the validity of our scheme with energy efficiency of up to 26.63% and filtering capacity up to 15.92% as compared to the existing scheme.

무선 센서 네트워크는 제한된 자원과 무선 통신 사용으로 공격자에게 취약하기 때문에 공격자는 쉽게 노드를 훼손할 수 있고 허위 보고서 주입 공격과 같은 다양한 공격을 시도한다. 허위 보고서 주입 공격은 허위 보고서를 전달하는 과정에서 발생하는 에너지 고갈과 기지 노드에 허위 알람을 일으켜 금전적 손실을 발생시킨다. 이 문제를 다루기 위한 기존 기법 중 하나인 동적 여과 기법은 허위 보고서를 탐지함으로써 에너지를 절약할 수 있다. 동적 여과 기법의 키 분배 단계는 공격이 발생한 소스 노드 근처의 노드가 허위 보고서를 탐지할 수 있는 키를 갖지 못할 수 있다. 따라서 지속적인 공격에 노출될 경우 불필요한 에너지 손실이 발생한다. 본 논문에서는 이러한 문제를 개선하기 위해 키 재분배 기법을 제안한다. 제안 기법은 초기에 분배된 비밀 키를 사용하여 빠른 허위 보고서 탐지를 통해 에너지를 절약한다. 실험 결과는 기존 기법과 비교하였을 때 최대 26.63% 에너지 절약과 최대 15.92%의 탐지 성능 향상을 보인다.

Keywords

References

  1. S. H. Lee, S. Lee, H. Song and H. S. Lee, "Wireless sensor network design for tactical military applications: Remote largescale environments," in Military Communications Conference, 2009. MILCOM 2009. IEEE, 2009, pp. 1-7.
  2. M. Castillo-Effer, D. H. Quintela, W. Moreno, R. Jordan and W. Westhoff, "Wireless sensor networks for flash-flood alerting," in Devices, Circuits and Systems, 2004. Proceedings of the Fifth IEEE International Caracas Conference on, 2004, pp. 142-146.
  3. H. Park and T. H. Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. 2012. https://doi.org/10.5391/JKIIS.2012.22.1.108
  4. J. Yick, B. Mukherjee and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, 2008 . https://doi.org/10.1016/j.comnet.2008.04.002
  5. S. Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical clustering algorithm for wireless sensor networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1713-1723.
  6. Z. Yu and Y. Guan, "A dynamic en-route filtering scheme for data reporting in wireless sensor networks," IEEE/ACM Transactions on Networking (ToN), vol. 18, pp. 150-163, 2010. https://doi.org/10.1109/TNET.2009.2026901
  7. D. J. Park and T. H. Cho, "Efficient Key Re-dissemination Method for Saving Energy in Dynamic Filtering of Wireless Sensor Networks," The Korea Society of Computer and Information, vol. 23, pp. 71-72, 2015, 7.
  8. S. Zhu, S. Setia, S. Jajodia and P. Ning, "An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks," in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 2004, pp. 259-271.
  9. A. S. Uluagac, R. A. Beyah, Y. Li and J. A. Copeland, "VEBEK: Virtual energy-based encryption and keying for wireless sensor networks," Mobile Computing, IEEE Transactions on, vol. 9, pp. 994-1007, 2010. https://doi.org/10.1109/TMC.2010.51
  10. R. Lu, X. Lin, H. Zhu, X. Liang and X. Shen, "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 23, pp. 32-43, 2012. https://doi.org/10.1109/TPDS.2011.95
  11. A. Perrig, R. Szewczyk, J. Tygar, V. Wen and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless Networks, vol. 8, pp. 521-534, 2002 . https://doi.org/10.1023/A:1016598314198
  12. S. M. Nam and T. H. Cho, "Dynamic States Consideration for Next Hop Nodes Selection Method to improve Energy Efficiency in LEAP based Wireless Sensor," Ournal of Korean Institute of Intelligent Systems, vol. 23, pp. 558-564, 2013 . https://doi.org/10.5391/JKIIS.2013.23.6.558