DOI QR코드

DOI QR Code

Secure Data Gathering Protocol over Wireless Sensor Network

무선센서네트워크에서 안전한 데이터 수집 프로토콜

  • 최해원 (경운대학교 컴퓨터공학과) ;
  • 류명춘 (경운대학교 컴퓨터공학과) ;
  • 이채수 (경운대학교 모바일 공학과) ;
  • 김현성 (경일대학교 컴퓨터공학과)
  • Received : 2013.10.23
  • Accepted : 2013.12.20
  • Published : 2013.12.28

Abstract

A secure data gathering in a Wireless Sensor Network(WSN) has given attention to one of security issues. In general, the process of secure data gathering causes difficulties: one process is exchanging the secured data and the other is constructing secured data path. The previous studies have been resolving the difficulties in terms of two problems: security and data gathering in WSNs. However, a WSN requires a protocol that has to guarantee a security of path between sensors and sink, or a cluster head. Thus how to gather data securely is an important issue. In this paper, we propose a secure data gathering protocol over WSNs, which consists of hierarchical key settlement and secure path construction, and aims at tackling two problems. The proposed protocol causes little overhead to sensor nodes for secured key settlement and path construction. This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation.

무선센서 네트워크에서 안전한 데이터 수집은 중요한 보안이슈 중에 하나이다. 일반적으로 안전한 데이터 수집이란 데이터 자체의 보안과 안전한 전송 경로 확보를 의미한다. 본 논문은 이와 같은 관점에서 무선센서 네트워크에서 안전한 데이터 수집 프로토콜을 제안한다. 제안하는 프로토콜은 계층형 센서네트워크를 고려한 계층형 키 보안 기법과 안전을 보장할 수 있는 전송경로 설정을 핵심적으로 제시한다. 프로토콜은 네트워크 부하를 최소화 할 수 있도록 최적화 되었으며 네트워크 공격으로 인해 발생하는 문제점을 효과적으로 차단한다. 성능평가 결과 제안하는 프로토콜은 네트워크 퍼포먼스를 고려한 데이터 수집에 효율적이다. 데이터 수집 시 안전을 확보하기 위한 보안 분석 역시 검증해 보았다.

Keywords

References

  1. Mao, G.; Fidan, B.; Anderson, B. Wireless sensor network location techniques. Computer Networks: The International Journal of Computer and Telecommunications Networking. 2007, 29, pp. 2529-2553.
  2. Arampatzis, T.; Lygeros, J.; Manesis, S. A survey of applications of wireless sensor and wireless sensor networks. In Proceedings of IEEE International Symposium on, Mediterrean Conference on Control and Automation, Limassol, Cyprus, 2005, 6, pp. 719-724.
  3. Yuxin, M.; Guiyi, W. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks. Sensors. 2010, pp. 9529-9540.
  4. Culler, D.; Estrin, D.; Srivastava, M. Overview of sensor networks. IEEE Comput. 2004, 8, pp. 41-49.
  5. Tiwari, M.; Arya, K.V.; Choudhari, R.; Choudhary, K.S. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology. 2009, pp. 824-828.
  6. Giruka, V. C.; Singhal, M.; Royalty J.; Varanasi, S. Security in wireless sensor networks. Wireless Communications and Mobile Computing. 2008, 8, pp. 1-24.
  7. Ozdemir, S. Secure and reliable data aggregation for wireless sensor networks. Lecture Notes in Computer Science. 2007, 4836, pp.102-109.
  8. Sang, Y.; Sang, H.; Shen, Y.; Inoguchi, Y.; Tan, Y.; Xiong, N. Secure data aggregation in wireless sensor networks: A survey. Proc. of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies. 2006, pp. 315-320.
  9. Karlof, C. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Proc. of IEEE SNPA 2003. 2003, pp. 113-127.
  10. Yang, Y.; Wang, X.; Zhu, S.; Cao, G. SDAP: A secure hop-by-Hop data aggregation protocol for sensor networks. Proc. of ACM MobiHoc 2006, 2006.
  11. Shu, T.; Liu, S.; KrunzSecure, M. Data collection in wireless sensor networks using randomized dispersive routes. Proc. of IEEE INFOCOM 2009, 2009, pp. 2846-2850.
  12. Mahesh, K.M.; Samir, R.D. Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Comput. Commun. Rev. 2002, pp.92-93.
  13. Lee, S. J.; Gerla, M. Split multipath routing with maximally disjoint paths in Ad hoc networks. Proc. of ICC 2001. 2001, pp. 3201-3205.
  14. Guo, H.; Mu, Y.; Lin, Z.; Zhang, X. An efficient and non-interactive hierarchical key agreement protocol. Computers & Security. 2011, 30, pp. 28-34. https://doi.org/10.1016/j.cose.2010.10.003
  15. Boneh, D.; Franklin, M. Identity based encryption from the Weil pairing. Lecture Notes in Computer Science. 2001, 2139, pp. 213-229.
  16. Wu, K.; Dreef, D.; Sun, B.; Xiao, Y. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks. 2007, 5, 1, pp.100-111. https://doi.org/10.1016/j.adhoc.2006.05.009
  17. Shamir, A. How to share a secret. Comm. ACM, 1979, 22, pp. 612-613. https://doi.org/10.1145/359168.359176
  18. Kim, H. S. Location-based authentication protocol for first cognitive radio networking standard. Journal of Network and Computer Applications. 2011, 34, pp. 1160-1167. https://doi.org/10.1016/j.jnca.2010.12.017
  19. He, D. An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks. 2012, 10, pp. 1009-1016. https://doi.org/10.1016/j.adhoc.2012.01.002
  20. Gouvea, C. P. L; Lopez, J. Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. Lecture Notes in Computer Science. 2009, 5922, pp. 248-262.
  21. Rosli, R.; Yusoff, Y. M.; Hashim, H. A review on pairing based cryptography in wireless sensor networks. Proc. of ISWTA 2011. 2011, pp. 48-51.
  22. Szczechowiak, P.; Oliveira, L. B.; Scott, M.; Collier, M.; Ricardo, D. NanoECC:Testing the limits of Elliptic Curve Cryptography in Sensor Networks. Lecture Notes in Computer Science. 2008, 4913, pp. 305-320.
  23. Xiong, X.; Wong, D. S.; Deng, X. TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. Proc. of WCNC 2010. 2010, pp. 1-6.