DOI QR코드

DOI QR Code

Design of USN Communication Protocol Using Individual Chaotic Systems

개별 혼돈 시스템을 이용한 USN 통신 프로토콜 설계

  • Yim, Geo-Su (Department of Electrical Engineering, PaiChai University)
  • Received : 2015.12.01
  • Accepted : 2015.12.18
  • Published : 2015.12.30

Abstract

In the construction of USN environment, the implementation of a safe sensor network using wireless communications can be said to be the most important factor in the entire system. Although USN communication uses wireless communications to enhance accessability and non-contact capability, this results in the security vulnerability, thus endangering the system. In this regard, we propose a security protocol that can be effectively applied to USN, a multi-sensor network. The proposed protocol is a method using an individual chaotic system, and it is a security protocol to synchronize the main chaotic system mounted on each sensor and prepared key values into the initial values, and to communicate with the use of the synchronized values as symmetric keys. The communication protocol proposed in this paper is expected to yield good results as a new method to resolve security problems of USN and program capacity limitations of sensor nodes if subsequent studies continue to be carried out.

USN 환경의 구축에 있어서 무선통신을 이용한 안전한 센서 네트워크 구현은 전체 시스템에 있어서 가장 중요한 요소라고 할 수 있다. USN 통신은 접근성, 비접촉성을 높이기 위해 무선통신을 사용하고 있으나 이것으로 인한 보안의 취약성은 시스템을 위험하게 하고 있다. 우리는 이런 다중센서 네트워크인 USN에 효율적으로 적용할 수 있는 보안 프로토콜을 제안한다. 우리가 제안한 프로토콜은 개별 혼돈 시스템을 이용한 방법으로 각각의 센서에 장착된 혼돈시스템을 주 혼돈 시스템과 미리 준비된 킷값을 초깃값으로 동기화시키고, 동기화된 값을 대칭키로 하여 통신하는 보안 프로토콜이다. 본 논문에서 보인 통신 프로토콜은 USN의 취약한 보안 문제와 센서노드의 프로그램 용량 제한 문제점을 해결하기 위한 새로운 방법으로 계속적인 후속 연구가 이루어진다면 좋은 성과를 얻을 수 있을 것으로 생각된다.

Keywords

References

  1. D. -H. Shin, "Design of Remote Health Monitoring System Based on USN", Journal of Korean Institute of Information Technology, vol. 7, no. 4, pp. 183-187, Oct. 2009.
  2. C.-H. Lee, S.-C, Jeong, Y.-S. Ock, and M.-S, Kim, "Development of Water Quality Monitoring System using USN", Journal of Korean Institute of Information Technology, vol. 10, no. 8, pp. 153-163, 2012.
  3. G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System", Korea Information Assurance Society, vol. 8, no. 3, pp. 57-64, 2008.
  4. G.-S. Yim, and H.-S. Kim, "Chaos-based Image Encryption Scheme using Noise-induced Synchronization", J. of the Korea Society of Computer and Information, vol. 13, no. 5, pp. 155-162, 2008.
  5. G.-S. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameters Chaotic System", Korea Information Assurance Society, vol. 8, no. 3, pp. 57-64, 2008.
  6. J. C. Yen, and J. I. Guo, "A new chaotic key-based design form image encryption and decryption", The 2000 IEEE international symposium on circuits and system, pp. 49-52, May. 2000.
  7. H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feedbacks Stream Cipher for Image Encryption and Decryption", Information, vol. 31, pp. 121-129, 2007.
  8. F. Fu. Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme", International Conference on Computer Science 2007, pp. 575-582, June, 2007.
  9. G. G. Schuster, "Deterministic Chaos: An Introduction: 2nd edition", VCH, pp. 17-19, Dec. 1997.
  10. A. H. Nayfeh, and B. Blachandran, "Applied Nonlinear Dynamics" Wiley-Interscience, pp. 4-5, 1995.
  11. E. Ott, "Chaos in Dynamical Systems Second Edition", Cambridge University Press, pp. 15-18, Sept. 1996.
  12. G. P. Williams, "Chaos Theory Tamed", Tayler&Francis, pp. 211-219, 1997.