검색 상세

무선센서네트워크에서의 하이브리드 키 관리 기법

A Hybrid Key Management Scheme for Wireless Sensor Networks

초록/요약

Nowadays, there have been major advances in the development of low power micro-sensor nodes (sensors for short). The emergence of such sensors has led practitioners to envision networking a large set of sensors scattered over a wide area of interest into a wireless sensor network (WSN) for large-scale event monitoring and data collection and filtering The energy-constrained nature of WSN, the absence of the static infrastructure, the use of wireless channels, and the large number of nodes make the task of incorporating security in WSN a challenging problem. Most of the well known security schemes designed for traditional wire-line and wireless networks introduce significant computation and communication overhead and, thus, cannot be readily applied to WSN. In this paper, we present a novel solution to the problem of key management in WSN. Specifically, we propose a lightweight scheme for clustered WSN based on a combinatorial formulation of the group key management problem. Our solution minimizes the energy and memory consumption of the security protocol. We also introduce a novel key assignment scheme for reducing the potential of collusion by factoring the geographic location of nodes in key assignment.

more

목차

1. Introduction = 2
1.1 Related Work = 5
1.1.1 Unique Pairwise Keys for All Pairs = 5
1.1.2 Use of a Trusted Base Station as a KDC = 6
1.1.3 Random Key Chain Pre-distribution Scheme = 7
1.1.4 Random Pairwise Keys Scheme = 9
1.1.5 λ-Secure Key Establishment Schemes = 11
1.1.6 Multispace Key Schemes = 12
1.1.7 Deterministic Key Pre-distribution Schemes = 13
1.2 Main contribution of this paper = 14
2. System and Threat Models = 16
2.1 System Architecture = 16
2.2 Threat model = 19
3 Improved Exclusion Basis Systems (EBS) = 21
3.1 The Original Exclusion Basis Systems = 21
3.2 The Improved Exclusion Basis Systems = 24
4. Description of CHI = 27
4.1 Components and Responsibilities = 27
4.1.1 Base Station = 27
4.1.2 Gateway = 29
4.1.3 Sensor Node = 30
4.2 Key Management Scheme = 31
4.2.1 Pre-distribution = 31
4.2.2 Direct Key Discovery = 32
4.2.3 Path Key Establishment = 32
4.2.4 Addition of New Node and Re-keying = 33
4.2.5 Key Revocation = 35
5. Performance Analysis = 38
5.1 Overhead = 38
5.2 Memory Usage = 39
5.3 Security Analysis = 43
6. Conclusion = 47
Reference = 50

more