DOI QR코드

DOI QR Code

Transaction Signing-based Authentication Scheme for Protecting Sinkhole Attack in Directed Diffusion based Wireless Sensor Networks

디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격을 막기 위한 트랜잭션 서명기법에 관한 연구

  • 김태경 (서울신학대학교 교양학부)
  • Received : 2010.07.30
  • Accepted : 2010.08.26
  • Published : 2010.09.30

Abstract

In this paper, We propose a transaction signing-based authentication scheme for protecting sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks such as denial of service attacks, selective delivery or data tamper etc. We analyze sinkhole attack methods in directed diffusion based wireless sensor networks. For the purpose of response to attack method, Transaction signing-based authentication scheme is proposed. This scheme can work for those sensor networks which use directed diffusion based wireless sensor networks. The validity of proposed scheme is provided by BAN logic.

Keywords

References

  1. 최병구, 조응준, 홍충선, "무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법, " 정보과학회논문지 제14권 9호, 2008년 12월, pp. 901-905.
  2. N. Xu, "A Survey of Sensor Network Applications," Tech. Rep., University of Southern California, 2002.
  3. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," IEEE Communications Magazine, Vol. 40, No. 8, 2002.
  4. J. N. AlKaraki, A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, Vol. 11, No. 6, 2004, p. 628.
  5. C. Karlof, D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, Vol. 1, No. 23, 2003.
  6. C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," in Proceedings of ACM Mobicom, Boston, MA, 2000.
  7. 문수영, 조대호, "디렉티드 디퓨젼 기반의 무선 센서 네트워크에서의 싱크홀 공격과 그 대응 방법, "정보처리학회 춘계 학술대회 제19권 1호, 2009년, pp. 309-311.
  8. 임형진, 이정근, 김문성, "안전한 인터넷 뱅킹을 위한 트랜잭션 서명기법에 관한 연구," 한국 인터넷 정보학회 9권 6호, 2008년, pp. 73-79.
  9. M. Burrows, M. Abadi, R. Needham: A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990. https://doi.org/10.1145/77648.77649