• Title/Summary/Keyword: 센서 보안

Search Result 807, Processing Time 0.024 seconds

Impersonation Attacks on Anonymous User Authentication and Key Agreement Scheme in Wireless Sensor Networks (무선센서네트워크에서 익명의 사용자 인증과 키동의 기법에 대한 가장 공격)

  • Choi, Hae-Won;Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.287-293
    • /
    • 2016
  • Wireless sensor networks (WSNs) have many applications and are deployed in a wide variety of areas. They are often deployed in potentially adverse or even hostile environment so that there are concerns on security issues in these WSNs. Recently, an anonymous user authentication and key agreement scheme (AUAKAS) was proposed based on symmetric cryptosystem in WSNs. It is claimed in AUAKAS that it assures security against different types of attacks including impersonation attacks. However, this paper shows that AUAKAS does not cope from user impersonation attack and gateway impersonation attack from the legally registered user on the gateway. The security analysis could guide the required features of the security scheme to be satisfied.

Management Scheme of Sensor Network using Circular Coordinates (원형 좌표계를 이용한 센서네트워크 키 관리 기법)

  • Hong, Seong-Sik;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.71-80
    • /
    • 2006
  • Sensor network is made from very small and restrictive-power nodes, and they collect some information of environment like as thermal and tremor, etc. And they transfer the information to each other. Generally, supporting the Security service of sensor network is a difficult work, because the nodes have very small cpu-power and low electronic-power. So, More effective management scheme will needed for the maintenance of stability. In this paper, we propose the location based management scheme with circular coordinates. We were make the with the relative location information from one node to other. The new scheme show more simple and effective result then the other method for key management.

  • PDF

Active Warehouse Condition Management System based on RFID/USN Security (보안을 고려한 RFID/USN 기반의 능동형 창고 상태 관리 시스템)

  • John, Young-Jun;Choi, Yong-Sik;Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.122-127
    • /
    • 2006
  • RFID/USN 은 유비쿼터스 사회의 중요한 기반 인프라로서 고려되고 있다. 또한 다양한 연구를 통해 실용적인 접목이 시도 되고 있다. 특히 물류 시스템에서 물류의 입출 재고와 상태 관리를 위한 연구가 진행 중에 있으며 이는 물품 보관 단위인 파렛트(Pallet) 에 RFID 태그를 부착하여 입/출고시의 물품을 식별하고, Zigbee 무선 통신기능을 가진 센서 모듈에 의해 물품의 환경 상태 정보를 파악하는 형태로 이루어진다. 본 논문은 RFID/ USN 기반의 창고 상태 관리 시스템에서 상태정보 습득 과정의 보안적용을 위한 시스템을 구성을 주된 목적으로 한다. 부가적으로 상태정보 습득에 사용되는 이동형 단말장치의 기능에 대해서 제안한다. 창고 내에 배치되는 RFID 와 센서노드간의 적용 관계 또한 정의한다. 결과적으로 본 논문은 의사판단의 주체인 현장 관리자에 적절한 제어 정보의 제공과 센서의 동작을 제어하기 위한 RFID tag 보안 접근, 그리고 센서 노드 자체의 생존성 이라는 세 가지 관점의 절충점을 찾기 위한 시도로서 설계하였다.

  • PDF

A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks (무선 센서네트워크에서 침입탐지를 위한 탐지노드 활성화기법 연구)

  • Seong, Ki-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5238-5244
    • /
    • 2011
  • Recently, wireless sensor networks have become increasingly interesting areas over extensive application fields such as military, ecological, and health-related areas. Almost sensor networks have mission-critical tasks that requires very high security. Therefore, extensive work has been done for securing sensor networks from outside attackers, efficient cryptographic systems, secure key management and authorization, but little work has yet been done to protect these networks from inside threats. This paper proposed an method to select which nodes should activate their idle nodes as detectors to be able to watch all packets in the sensor network. Suggested method is modeled as optimization equation, and heuristic Greedy algorithm based simulation results are presented to verify my approach.

A Strong Anonymity Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 강한 익명성 지원 구조)

  • Lee, Jung-Hyun;Kim, Tae-Yeon;Cho, Gi-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.139-148
    • /
    • 2010
  • In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Analyses of Requirement of Integrated Security for Secure Internet of Things (안전한 사물인터넷망의 융합 보안을 위한 요구사항 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.4
    • /
    • pp.667-674
    • /
    • 2015
  • Internet of things (IoT) has been a focus of research and widespread. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. In order to facilitate this emerging domain, we analyzed the research progress of IoT, and pay attention to the security. By means of deeply analyzing the security architecture and features, the security requirements are required. And, we surveyed the demands and requirements.

A study on modified Cluster-based Key Distribution in Wireless Sensor Networks (클러스터기반 센서네트워크에서 개선된 키 분배 연구)

  • Lee Kyoung-Hyo;Park Ic-Su;Jung Seok-Won;Kim Hyun-Gon;Oh Byoung-Kyun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.608-612
    • /
    • 2006
  • 센서네트워크는 유비쿼터스 컴퓨팅 기술의 핵심으로 자리 잡아가고 있다. 이러한 센서네트워크는 네트워크가 갖는 특성으로 인하여 일반 네트워크보다 보안에 취약하므로 안전한 통신을 위하여 센서 노드 간 키를 설정하는 것은 보안을 위한 기본적인 요구사항이 되고 있다. 센서네트워크를 클러스터링하여 각 클러스터별로 유일한 다항식을 할당하는 클러스터기반 키 분배에서 클러스터 헤더가 할당하는 다항식 부분정보(polynomial share)인 일변수 다항식 정보는 키 분배시 도청에 의하여 클러스터 헤더의 키인 이변수 다항식을 계산할 수 있었다. 따라서 본 논문에서는 클러스터헤더가 동일한 클러스터내의 센서노드들에게 다항식 부분정보를 배분할 때 다항식을 계산한 상수값을 분배함으로써 클러스터에 도청으로부터 다항식을 알아낼 수 없게 하여 센서노드 간 안전한 통신을 할 수 있게 하였다.

  • PDF

A Key Management Scheme for Commodity Sensor Networks (소모형 센서 네트워크 환경에 적합한 키 관리 스킴)

  • Kim Young-Ho;Lee Hwa-Seong;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.71-80
    • /
    • 2006
  • To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pair-wise key establishment in sensor networks by Anderson, Chan, and Perrig. They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.

A Design on Secure Communication Protocol for USN Fire Detection Systems (USN 화재 탐지 시스템에서의 보안통신 프로토콜 설계)

  • Kim, young-hyuk;Lim, il-kwon;LiQIGUI, LiQIGUI;Park, so-a;Kim, myung-jin;Lee, jae-kwang
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.52-54
    • /
    • 2010
  • 본 논문에서는 최근 국가적으로 집중 투자되고 있는 U-City, U-Campus, U-Home 등 유비쿼터스 환경의 적합한 USN을 이용한 화재 탐지 시스템을 분석하고, 센서와 센서수신기 그리고 서버간의 안전한 통신과 무결성 확인을 위한 보안통신 프로토콜을 제안한다.

  • PDF