• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2008³â Ãá°èÇмú´ëȸ

2008³â Ãá°èÇмú´ëȸ

Current Result Document : 4 / 22 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Ȩ ³×Æ®¿öÅ©¸¦ À§ÇÑ º¸¾È ½Ã½ºÅÛ ±¸Çö¿¡ °üÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study of Implementation for Home Networking Security System
ÀúÀÚ(Author) ¼³Á¤È¯   ±èÀΰ⠠ À̱⿵   Jeong-hwan Seol   In-Kyum Kim   Ki-young Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 12 NO. 01 PP. 0616 ~ 0619 (2008. 05)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â Ȩ ³×Æ®¿öÅ© ¼­ºñ½º¸¦ À§ÇÑ ÀÎÁõ ½Ã½ºÅÛÀ» ¼³°è, ±¸ÇöÇÏ¿´´Ù. ¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ÀÇ Å° °ü¸® ±â¹ýÀÎ ´ëĪŰ »çÀü ºÐ¹è ¹æ½ÄÀ» Àû¿ëÇÏ¿© ÀÎÁõÅ°ÀÇ ³ëÃâÀ» ¹æÁöÇÏ¿´´Ù. ¶ÇÇÑ TinyOSÀÇ TOS_Msg ±¸Á¶¸¦ º¯ÇüÇÏ¿´´Ù. TOS_Msg´Â 29¹ÙÀÌÆ®ÀÇ µ¥ÀÌÅÍ ¹è¿­À» »ç¿ëÀÚ¿¡ ÀÇÇØ º¯°æ °¡´ÉÇϵµ·Ï Á¦°øÇÏ°í ÀÖ´Ù. ÀÌ µ¥ÀÌÅÍ ¹è¿­¿¡ 8¹ÙÀÌÆ®ÀÇ ÀÎÁõÅ°¸¦ ÀúÀåÇÏ¿´´Ù. ¶ÇÇÑ SPINS¸¦ ±â¹ÝÀ¸·Î RC5¸¦ »ç¿ëÇÏ¿© ÀÎÁõÅ° ¹× µ¥ÀÌÅÍÀÇ ¾Ïȣȭ ¹× º¹È£È­¸¦ ¼öÇàÇÏ¿´´Ù. ½ÇÇèÀ» ÅëÇØ ´Ù¸¥ ±×·ìÀÇ ¼¾¼­ ³ëµå¿Í º£À̽º ½ºÅ×À̼Ç(BS) »çÀÌÀÇ Åë½Å ¹× ¾ÇÀÇÀûÀÎ ¸ñÀûÀ» °¡Áö°í Ãß°¡µÈ ¼¾¼­ ³ëµå¿ÍÀÇ Åë½ÅÀ¸·Î ÀÎÇÑ ¿ÀÀÛµ¿À» ¹æÁöÇÒ ¼ö ÀÖÀ½À» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn¡¯t happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.
Å°¿öµå(Keyword) Home Networking   SPINS   Å° °ü¸®   ÀÎÁõ  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå