11 research outputs found

    Reputation-based cluster head elections in wireless sensor networks

    No full text
    In clustered sensor networks, because CHs (Cluster Heads) collect data from sensors and transmit the aggregated data to the sink, it is very important to elect the CHs in a secure manner. In order to protect CH elections from attackers, unpredictability, non-manipulability, and agreement property should be guaranteed in CH elections. However, existing schemes for secure CH election cannot prevent intelligent attackers from violating the properties via cooperation. In this paper, we propose a scheme which securely elects CHs by detecting intelligent attackers and excluding them. For every CH election round, each CH candidate provides reputation values to other CH candidates according to their behavior and extracts real reputation values. Then, each node evaluates the real reputation values of members in its cluster and excludes some disreputable nodes from CH candidates. The scheme greatly enhances the non-manipulability and agreement property of CH election results compared to other rival schemes. Furthermore, the scheme presents higher non-manipulability and higher agreement property than other schemes, even in an environment where message losses can occur

    IPv6 보안 가이드

    No full text

    Clustering-Based Key Renewaks for Wireless Sensor Networks

    No full text
    In the proposed scheme, every sensor establishes communications keys with its neighbors after deployment. They are selectively employed for intra-cluster communications, and the employed keys are determined by local topology of clusters. Thus, our scheme periodically changes the local topology of clusters so as to renew the intra-cluster communication keys. Besides, new Cluster Heads (CHs) easily share a key with the Base Station (BS) by informing the BS of their member information without sending key materials. Simulation results prove that our approach has strong resiliency against the increase of compromised sensors. It also achieves a performance gain in terms of energy

    A Secure Cluster Formation Scheme in Wireless Sensor Networks

    No full text
    Inwirelesssensornetworks,clusteringexpeditesmanydesirablefunctionssuchasloadbalancing,energysavings,distributedkeymanagement,andsoon.Forsecureclustering,itisveryimportanttofindcompromisednodesandremovethemduringtheinitialclusterformationprocess.Ifsomenodesarecompromisedandsurvivethecensorshipprocess,theycanmakesomenodeshaveadifferentclusterviewandcansplitaclusterintomultipleclusterstodeteriorateclusterqualityasawhole.Toresolvetheseproblems,weproposearobustschemeagainstsuchattacksinthispaper.First,ourschemegenerateslargesizedclusterswhereanytwonodesareatmosttwohopsawayfromeachothertoraisethequalityofclusters.Second,ourschemeemploystheverificationoftwohopdistantnodestopreservethequalityofthelargesizedclustersandrefrainsfromsplittingtheclusters.Last,ourschemeprefersbroadcasttransmissionstosavetheenergyofnodes.Securityanalysisprovesthatourschemecanidentifycompromisednodesandpreservestheclustermembershipagreementagainstthecompromisednodes.Inaddition,simulationresultsprovethatourschemegeneratesfewerclustersandismoresecureandenergy-efficientthantheschemeproducingonlysmallsizedclusters

    Secure Cluster Head Sensor Elections Using Signal Strength Estimation and Ordered Transmissions

    No full text
    In clustered sensor networks, electing CHs (Cluster Heads) in a secure manner is very important because they collect data from sensors and send the aggregated data to the sink. If a compromised node is elected as a CH, it can illegally acquire data from all the members and even send forged data to the sink. Nevertheless, most of the existing CH election schemes have not treated the problem of the secure CH election. Recently, random value based protocols have been proposed to resolve the secure CH election problem. However, these schemes cannot prevent an attacker from suppressing its contribution for the change of CH election result and from selectively forwarding its contribution for the disagreement of CH election result. In this paper, we propose a modified random value scheme to prevent these disturbances. Our scheme dynamically adjusts the forwarding order of contributions and discards a received contribution when its signal strength is lower than the specified level to preven

    과학기술연구망 보안체계 강화 방안

    No full text

    2009 IPv6 보안 현황

    No full text

    DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks

    No full text
    In modern sensor networks, key management is essential to transmit data from sensors to the sink securely. That is, sensors are likely to be compromised by attackers, and a key management scheme should renew the keys for communication as frequently as possible. In clustered sensor networks, CHs(Cluster Heads) tend to become targets of compromise attack because they collect data from sensors and delivers the aggregated data to the sink

    An Evaluation Modeling of Network Performance Considering Performance Features of the Node According to Network Characteristics

    No full text
    funder : 국무조정실라우터 장비의 종류와 수의 증가에 따라, 서로 다른 장비들의 성능에 대한 절대.상대 평가가 필요하게 되었다. 그러나 아직 라우터 장비 평가에 적합한 성능 지표가 부족하여, 실제 개연성이 적은 장비 제공업체가 제시한 사양에만 의존하여 장비를 도입하는 실정이다. 따라서 본 연구에서는 네트워크 환경에서 이들 라우터 장비의 기능을 객관적으로 평가하기 위한 시험 지표와 방법론을 제안한다. 이를 위하여 국제표준시험소의 평가 방법론을 분석하여 라우터 장비의 성능 요소를 추출하였다. 그리고 지금까지 구현된 평가도구(예 : DBS, IPerf, NetPerf, NetSpec) 을 분석하고 실세계 실험을 통하여 성능 도구를 위한 기본 모형을 정의하였다. 이러한 일부 시험 환경 구축 적용 내용을 전체적인 성능 요소별로 구분하여, 전체 시스템 관점에서 성능을 비교할 수 있도록 성능 분석을 위한 통합 모델을 설계하였다. 이러한 설계모델을 바탕으로, 실제 사용자들이 편리하게 라우터 장비의 성능을 측정하고 체계적이고 객관적으로 판단할 수 있는 근거를 제공하는 라우터 성능 평가 시스템을 구현하였다.1. Establish the bases for router performance test and accumulate the test cases reestablish the bases of objective performance evaluation for practical adaptation to the KREONET (Korea Research Environment Open NETwork) by analyzing the standard documents for performance evaluation analyze the program sources for the router's function verification and performance evaluation provide a test environment of router's function test and performance evaluation accumulate the test cases using the test methodologies for router performance evaluation 2. Study of the router test techniques identify appropriate test tools according to the bases of performance evaluation and analyze the relationship between the tools and the performance metrics analyze the users' requirements based on the performance test environment of routers and test cases and design the interfaces which provides users valuable information design the database schema based on the performance test environment of routers and test cases and implements the core modules for performance valuation reflect the additional user requirements to the model based on the various test environments and make an integrated performance estimation tool for router evaluation which is suitable for heterogeneous networks

    Design and Engineering for the Cyber-Infrastructure Resource

    No full text
    funder : 교육과학기술부agency : 기초기술연구회□ 슈퍼컴퓨팅 인프라 구축·운영 ○ 초대형 슈퍼컴퓨팅 시스템의 안정적 운영을 위한 운영 체제 수립 ○ Top500 순위 10위권대의 세계적 수준의 슈퍼컴인프라 구축 확대 ○ 수천 노드 이상의 시스템 모니터링 기술개발 및 적용 ○ 슈퍼컴퓨터 공동활용 통합 서비스 환경 구축 및 사용자 서비스 기반 완성 ○ 파트너십 확대를 통한 슈퍼컴퓨터 공동활용 통합 서비스 연동 자원 확대 □ 국내외 과학기술협업 연구망 인프라 구축·운영 ○ 국가 사이버 인프라 핵심인 연구망 백본 및 기가급 기반, 서비스 인프라를 전년대비 105% 이상 확대 ○ 연구망 인프라 운영기반 강화 및 L2기반 연결 지향형 서비스 기반 조성 ○ 국제 표준 대비 연구망 운영수준 100% 유지 (국내외 망 지연시간 표준준수) ○ 국제 수준의 한~미, 한~중 10Gbps급 글로벌 과학기술 협업 연구망을 구축·운영하고 세계 18대 한국 국제람다교환노드(KRLight) 기반을 구축하여, 고성능의 안정적인 국제 선도 과학기술협업연구망 환경 제공 ○ 국제적 수준의 북미, 유럽의 글로벌 협업 네트워크 테스트베드 연계 구축과 공동기술연구(4건) 및 국제 연구망 활용 활성화를 위한 기가급 국제 첨단 응용 연구 지원(36건)A. Final goals of research Construction of the World-class R&D cyber-infrastructure ○ Design, construction, operation and engineering of the the supercomputer, the science and technology research network, and cooperative research environment B. Contents of research ○ Supercompouting infrastructure deployment and operation - 4th supercomputer second phrase deployment and operation - Increasing user utilization for large-scale supecomputer - Utilizing service and global shared service environment build based on virtualization ○ Construction and operation of the domestic and international scientific research network - KREONET(Korea Research Environment Open NETwork) construction, operation and engineering - Research network operation center and security center advancement - Research network operation cooperation systematic construction - GLORIAD(GLOba1 RIng network for Advanced Applications Development) construction, operation and engineering - International research network technical cooperation reinforcement and application servic
    corecore