On the Security of Hierarchical Wireless Sensor Networks

계층적 무선 센서 네트워크에서의 키관리 메커니즘

  • Published : 2007.08.25

Abstract

We propose a group-based security scheme for hierarchical wireless sensor networks. We model the network for secure routing with 3-tier sensor network comprised of three types of nodes: Base Station, Group Dominator and ordinary Sensor Nodes. Group-based deployment is performed using Gaussian (normal) distribution and show that more than 85% network connectivity can be achieved with the proposed model. The small groups with pre-shared secrets form the secure groups where group dominators form the backbone of the entire network. The scheme is devised for dealing with sensory data aggregated by groups of collocated sensors; i.e., local sensed data are collected by the dominating nodes and sent an aggregated packet to the base station via other group dominators. The scheme is shown to be light-weight, and it offers a stronger defense against node capture attacks. Analysis and simulation results are presented to defend our proposal. Analysis shows that robustness can significantly be improved by increasing the deployment density using both the dominating and/or ordinary sensor nodes.

본 논문에서는 계층적 무선 센서 네트워크를 위한 그룹기반 보안 메커니즘을 제안한다. 이를 위해 세 가지 형태의 노드(베이스 스테이션 그룹 관리 노드 센서 노드)로 구성된 3계층 센서네트워크에서 안전한 라우팅을 위한 구조를 설계한다. 그룹기반 배치는 가우시안(Gaussian) 분산을 이용하여 수행되며, 제안된 모델을 사용해 85% 이상의 네트워크 연결이 가능하다. 이미 보안 기능을 공유하고 있는 작은 그룹들은 안전한 그룹을 형성하고, 그룹 관리 노드들은 전체 네트워크의 백본을 형성한다. 본 논문의 보안 메커니즘은 배치된 센서 그룹에서 수집된 데이터를 처리하기 위해 제안되었으며, 관리노드에 의해 수집된 센싱 데이터는 다른 관리노드를 거쳐 베이스 스테이션에 전달된다. 제안된 메커니즘은 경량화 되었고, 노드 캡쳐 공격에 강력하게 대응할 수 있으며 분석 자료와 시뮬레이션을 결과를 통해 이러한 특징을 확인할 수 있다. 또한, 분석 자료를 통해 그룹 관리노드와 센서 노드가 조밀하게 배치되었을 때 안전성이 크게 향상됨을 알 수 있다.

Keywords

References

  1. D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, 'Next century challenges: Scalable coordination in sensor networks,' in Proc. of ACM Mobicom, Seattle, Washington, USA, August 1999, pp. 263-270, ACM
  2. C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, 'Impact of network density on data aggregation in wireless sensor networks,' in ICDCS, 2002, pp. 457-458
  3. C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,'in MOBICOM, 2000, pp. 56-67
  4. B. Krishnamachari, D. Estrin, and S. Wicker, 'The impact of data aggregation in wireless sensor networks,' inInternational Workshop on Distributed Event-Based Systems, (DEBS '02), Vienna, Austria, July 2002
  5. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A Survey on sensor networks,' IEEE Communications Magn, vol. 40, no. 8, 2002
  6. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'Wireless Sensor Networks: A Survey,' Computer Networks, vol. 38, no. 4, March 2002
  7. N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUs,' in Proc. of the Sixth Workshop on Crypto- graphic Hardware and Embedded Systems (CHES'04), Cambridge, MA, USA, 2004, pp. 119-132
  8. C. K. Wong, M. Gouda and S. S. Lam, 'Secure Group Communications Using Key Graphs', IEEE/ACM Trans. on Networking, Vol. 8, No. 1. February 2000
  9. Donggang Liu, Peng Ning, and Wenliang Du., 'Group-Based Key Pre-Distribution in Wireless Sensor Networks,' in Proc. ACM WiSE'05, September 2, 2005
  10. L. Eschenauer and V. D. Gligor, 'A keymanagement scheme for distributed sensor networks,' in Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, November 2002
  11. W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, 'A key management scheme for wireless sensor networks using deployment knowledge,' in Proc. of the IEEE INFOCOM, pages 586-597, March 2004
  12. G.J. Pottie, and W.J. Kaiser, 'Wireless integrated network sensors,' Communications of the ACM 43(5) (2000), pp. 551-558
  13. S. M. Ross, Introduction to Probability Models, Academic Press, 2003, 8th Edition
  14. Y. W. Law, J. Doumen, and P. Hartel, 'Survey and benchmark of block ciphers for wireless sensor networks,' ACM Trans.on Sensor Networks, vol. 2, No. 1, pp. 65-93, February 2006 https://doi.org/10.1145/1138127.1138130