A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks

무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술

  • 천은홍 (우석대학교/컴퓨터공학과) ;
  • 이연식 (군산대학교/컴퓨터정보공학과)
  • Received : 2016.08.25
  • Accepted : 2016.09.20
  • Published : 2016.09.30

Abstract

The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

무선 센서 네트워크은 폭넓은 다양한 응용에서 경제적으로 성공할 수 있는 모니터링 솔루션이다. 그러나 악의적이거나 감시하는 사람이 없는 환경에서 침입을 인식하고 방지하며 안전하고 에너지 효율적인 것을 보장하는 네트워크를 통한 정보의 안전한 전송은 주된 도전이다. 이에 따라, 이 논문은 집적된 데이터의 무결성, 인증성과 비밀성을 보장하기 위하여 안전한 무선 센서 네트워크에 필수적인 보호를 포함하는 분산 클러스터링 프로세스를 제안한다. 안전한 키 관리 스킴을 위하여 대칭형과 비대칭형 키의 전단계 분산의 개념을 사용하고, 클러스터 내에 있는 각 센서 노드가 배치되기 전에 암호화를 위한 전단계 분산 매개변수를 사용하는 센서 네트워크 토폴로지에 기초한 계층적 클러스터에 대한 상세한 스킴에 대하여 기술한다. 마지막으로 무선 센서 네트워크에서 제안된 스킴의 성능 시험 결과를 보인다.

Keywords

References

  1. B. Parno, A. Perrig, and V. Gligor. "Distributed detection of node replication attacks in sensor networks," IEEE Symposium on Security and Privacy, pp. 1-5, 2009.
  2. Younis, O. and Fahmi, S. "Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on Mobile Computing, Vol. 3, No. 4 pp. 366-379, 2004. https://doi.org/10.1109/TMC.2004.41
  3. Lalita Yadav et al, "Low Energy Adaptive Clustering with Deterministic Cluster Head Selection," International Journal of Computer Science and Information Technologies, Vol. 5, No. 3, pp. 4661-4664, 2014.
  4. Aslam, M. Javaid, N. Rahim, A. Nazir, "Survey of Extended LEACH-Based Clustering Routing Protocols for Wireless Sensor Networks," IEEE Conference on Embedded Software and Systems, pp. 1232-1238, 2012.
  5. S. P. Barfunga, P. Rai, and H. K. Sarma, "Energy efficient cluster based routing protocol for wireless sensor network," IEEE Conferences on Computer and Communication Engineering, pp. 603-607, July. 2012.
  6. W. Gu, S. Chellappan, X. Bai, and H. Wang, "Scaling laws of key pre-distribution protocols in wireless sensor networks," Information Forensics and Security, IEEE Transactions on, Vol. 6, No. 4, pp. 1370-1381, 2011. https://doi.org/10.1109/TIFS.2011.2159001
  7. L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," Proceedings of the 9th ACM conference on Computer and Communications Security, pp. 41-47, 2002.
  8. H. M. Sun, M. E. Wu, M Jason Hinek, C. T. Yang and V. S. Tseng, "A pairwise key establishment for wireless sensor networks," Journal of Systems and Software, Vol. 82, No. 9, pp. 1503-1512, 2009. https://doi.org/10.1016/j.jss.2009.04.001
  9. C. Dhivya Devi et al. "study on security protocol in wireless sensor networks," International Journal of Engineering and Technology, Vol. 5, No. 1, 2013.
  10. C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and Countermeasures," IEEE International Workshop on Sensor Network Protocols and Applications, pp.293-315, 2003.
  11. Raed M. Bani Hani and Abdalraheem A. Ijjeh, "A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks," Journal of Communications, Vol 8, No 3, pp. 192-206, 2013. https://doi.org/10.12720/jcm.8.3.192-206