Jeong-Hyo Park, Yong-Hoon Jung, Kwang-Hyung Lee, Keun-Wang Lee, Moon-Seog Jun
언어
영어(ENG)
URL
https://www.earticle.net/Article/A207842
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Until now, the interests of the research about sensor network security have been focused on the security services that provide authentication, confidentiality, integrity, and availability. However, the interest in the issue of actual identifier's exposure of sensor node is rapidly increasing. Also, the interest in the efficiency of creating encryption key that is used for the sensor network is increasing. Many schemes for providing node's anonymity in the existing Ad-Hoc network were suggested, but these schemes are not appropriate for sensor network that is energy-limited, so a scheme for providing anonymity that is suitable for sensor network's characteristics is required. Also, Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve these problems, this research suggests LA2EP Protocol. LA2EP Protocol can minimize resource and provide a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested protocols, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor's ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.
목차
Abstract 1. Introduction 2. Related Works 2.1. The Research Related to the Existing Anonymity Authentication Scheme 2.2. The Research Related to the Existing Key Distribution Scheme 3. Assumptions and Design Goals 3.1. Network and Assumptions 3.2. Design Goals 4. Proposed Protocol 4.1. Overview and Notation 4.2. Light-weighted Anonymous Authentication Protocol 4.3. Optimized Encryption Key Management Protocol 5. Performance Evaluation 5.1. Security Analysis 5.2. Cost Analysis 6. Conclusion Acknowledgements References
키워드
Sensor Networkhigh limitation of resourceLA2EP ProtocolAnonymous AuthenticationOptimized EncryptionEntropy-based Modeling
저자
Jeong-Hyo Park [ Department of Computer Science, Soongsil University, Korea ]
Yong-Hoon Jung [ Department of Internet Information, Seoil University, Korea ]
Kwang-Hyung Lee [ Department of Internet Information, Seoil University, Korea ]
Keun-Wang Lee [ Department of Multimedia Science, Chungwoon University, Korea ]
Moon-Seog Jun [ Department of Computer Science, Soongsil University, Korea ]
보안공학연구지원센터(IJDTA) [Science & Engineering Research Support Center, Republic of Korea(IJDTA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Database Theory and Application
간기
격월간
pISSN
2005-4270
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Database Theory and Application Vol.5 No.1