DOI QR코드

DOI QR Code

Analysis of Power Efficiency in according to S-MAC attack in the Sensor Network

센서네트워크에서 S-MAC 공격에 따른 전력 효율성 분석

  • 홍진근 (백석대학교 정보통신학부)
  • Published : 2009.02.28

Abstract

In this paper, it is reviewed vulnerability of security in S-MAC communication protocol of sensor network, and analyzed in the respect of power efficiency, which is consumed at each stage of communication procedure in according to vulnerability of denial of service. Therefore, from research results, it can be induced the need of authentication scheme, which is considered reliability, efficiency and security of normal S-MAC communication.

본 논문에서는 센서 네트워크 S-MAC 통신 프로토콜에서 보안 취약성을 살펴보고 서비스 거부 공격의 취약성에 따른 영향을 통신절차 단계별로 소비되는 전력 효율성 측면에서 분석하였다. 따라서 연구 결과로부터 정상적인 S-MAC 통신을 위해 신뢰성, 효율성 및 보안을 고려한 인증방안의 필요성을 도출할 수 있다.

Keywords

References

  1. 대덕특구지원단, "U-센서네트워크," 2008 대덕특구 산업시장정보 보고서, 2008.12.
  2. 허재두, 최은창, 김동균, "센서네트워크 응용기술 동향," IITA 주간기술동향 통권 1457호, 2008. 7. 30.
  3. Xiaoming Lu, Matt Spear, Karl Levitt, Norman S. Matloff, S. Felix Wu, "A Synchronization Attack and Defense in Energy Efficient Listen-Sleep Slotted MAC Protocols," Proceedings of ICESIST2008. 2008. 8.
  4. Woonsik Lee, Hwang Soo Lee, "Analysis of a global synchronization algorithm in wireless sensor networks," Proceedings of MFI2008, 2008. 8.
  5. W. Ye, J. Heidemann and D. Estrin, "An Energy Efficient MAC Protocol for Wireless Sensor Networks," Proceedings of IEEE INFOCOM2002, June 2002. https://doi.org/10.1109/INFCOM.2002.1019408
  6. Lin P., Qiao C., Wang X., "Medium access control with a dynamic duty cycle for sensor networks," Proceedings of WCNC2004, March 2004. https://doi.org/10.1109/WCNC.2004.1311671
  7. T. V. Dam and K. Langendoen, "An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks," Proceedings of ACM Sensys2003, Nov. 2003.
  8. Wang, Hongfa, "A Robust Mechanism for Wireless Sensor Network Security," Proceedings of WiCOM2008, Oct. 2008. https://doi.org/10.1109/WiCom.2008.923