Earticle

현재 위치 Home

An Enhanced Light-weight Anonymous Authentication and Encryption Protocol in Wireless Sensor Network

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJDTA) 바로가기
  • 간행물
    International Journal of Database Theory and Application 바로가기
  • 통권
    Vol.5 No.1 (2012.03)바로가기
  • 페이지
    pp.1-20
  • 저자
    Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Keun-Wang Lee, Moon-Seog Jun
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A207842

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Until now, the interests of the research about sensor network security have been focused on the security services that provide authentication, confidentiality, integrity, and availability. However, the interest in the issue of actual identifier's exposure of sensor node is rapidly increasing. Also, the interest in the efficiency of creating encryption key that is used for the sensor network is increasing. Many schemes for providing node's anonymity in the existing Ad-Hoc network were suggested, but these schemes are not appropriate for sensor network that is energy-limited, so a scheme for providing anonymity that is suitable for sensor network's characteristics is required. Also, Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve these problems, this research suggests LA2EP Protocol. LA2EP Protocol can minimize resource and provide a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested protocols, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor's ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.

목차

Abstract
 1. Introduction
 2. Related Works
  2.1. The Research Related to the Existing Anonymity Authentication Scheme
  2.2. The Research Related to the Existing Key Distribution Scheme
 3. Assumptions and Design Goals
  3.1. Network and Assumptions
  3.2. Design Goals
 4. Proposed Protocol
  4.1. Overview and Notation
  4.2. Light-weighted Anonymous Authentication Protocol
  4.3. Optimized Encryption Key Management Protocol
 5. Performance Evaluation
  5.1. Security Analysis
  5.2. Cost Analysis
 6. Conclusion
 Acknowledgements
 References

키워드

Sensor Network high limitation of resource LA2EP Protocol Anonymous Authentication Optimized Encryption Entropy-based Modeling

저자

  • Jeong-Hyo Park [ Department of Computer Science, Soongsil University, Korea ]
  • Yong-Hoon Jung [ Department of Internet Information, Seoil University, Korea ]
  • Kwang-Hyung Lee [ Department of Internet Information, Seoil University, Korea ]
  • Keun-Wang Lee [ Department of Multimedia Science, Chungwoon University, Korea ]
  • Moon-Seog Jun [ Department of Computer Science, Soongsil University, Korea ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJDTA) [Science & Engineering Research Support Center, Republic of Korea(IJDTA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Database Theory and Application
  • 간기
    격월간
  • pISSN
    2005-4270
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Database Theory and Application Vol.5 No.1

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장