원문정보
초록
영어
Wireless sensor networks (WSNs) are vulnerable to various forms of security attacks because they are deployed in potentially adverse or even hostile environment. Research into security and routing mechanism designs specifically focused on WSNs has been challenging issues to researchers. Recently, Choi et al. proposed a secure data gathering protocol over WSNs based on an extended Sakai et al.’s non-interactive identity-based key agreement scheme. However, their protocol could provide attacker information including traffic flow identification, traffic flow tracking, or disclosing application-level information due to lack of freshness. This paper proposes a freshness preserving secure data gathering protocol over WSNs to solve the problem in Choi et al.’s protocol. Thereby, the proposed protocol could efficiently cope from the information leakage problem from adversary and could provide secure multipath over WSNs.
목차
1. Introduction
2. Security Operations
2.1. Bilinear Map and Security Assumption
2.2. Non-interactive Identity-based Key Agreement
3. Freshness Preserving Secure Data Gathering Protocol
3.1. Hierarchical Key Settlement
3.2. Secure Path Construction
3.3. Data Gathering
4. Analysis
4.1. Security Analysis
4.2. Performance Analysis
5. Conclusion
Acknowledgements
References