• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¸¦ À§ÇÑ °­ÇÑ ÀÍ¸í¼º Áö¿ø ±¸Á¶
¿µ¹®Á¦¸ñ(English Title) A Strong Anonymity Scheme for Wireless Sensor Networks
ÀúÀÚ(Author) ÀÌÁßÇö   ±èÅ¿¬   Á¶±âȯ   Junghyun Lee   Taeyeon Kim   Gihwan Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 11 NO. 03 PP. 0139 ~ 0148 (2010. 06)
Çѱ۳»¿ë
(Korean Abstract)
±âÁ¸ÀÇ ¼¾¼­ ³×Æ®¿öÅ© º¸¾È¿¡ ´ëÇÑ ¿¬±¸´Â ÀÎÁõ°ú ºñ¹Ð¼º, ¹«°á¼º, À̿뼺 µîÀ» Á¦°øÇÏ´Â º¸¾È ¼­ºñ½º¿¡ °ü½ÉÀÌ ÁýÁßµÇ¾î ¿ÔÀ¸³ª ÃÖ±Ù ¼¾¼­ ³ëµåÀÇ ½ÇÁ¦ IDÀÇ ³ëÃâ ¹®Á¦¿¡ ´ëÇÑ °ü½ÉÀÌ Áõ°¡ÇÏ°í ÀÖ´Ù. ¼¾¼­ ³ëµåÀÇ ½ÇÁ¦ ID°¡ ¿ÜºÎ °ø°ÝÀÚ¿¡°Ô ³ëÃâµÇ´Â °ÍÀ» ¹æÁöÇϱâ À§Çؼ­´Â ½ÇÁ¦ÀÇ ID¸¦ »ç¿ëÇÏÁö ¾Ê°í µ¿ÀûÀÎ °¡¸íÀ» »ç¿ëÇÏ´Â °ÍÀÌ ÀϹÝÀûÀÌ´Ù. ±×·¯³ª °¡¸íÀ» »ý¼ºÇϴµ¥ »ç¿ëµÇ´Â ºñ¹ÐÅ°(¶Ç´Â Çؽ¬Å°)¿Í ÇöÀçÀÇ °¡¸í(¶Ç´Â ³­¼ö)ÀÌ °ø°ÝÀÚ¿¡°Ô ³ëÃâµÇ¾úÀ» °æ¿ì¿¡ °ø°ÝÀÚ´Â ½±°Ô °¡¸íÀ» »ý¼ºÇÏ´Â ¹®Á¦°¡ ¹ß»ýÇÑ´Ù. º» ³í¹®¿¡¼­´Â ¼¾¼­ ³ëµåµé¿¡ ´ëÇÑ °­ÇÑ ÀÍ¸í¼ºÀÌ º¸ÀåµÇ´Â ±¸Á¶¸¦ Á¦¾ÈÇÑ´Ù. Á¦¾ÈµÈ ±¸Á¶´Â °¡¸íÀ» »ý¼ºÇϴµ¥ »ç¿ëµÇ´Â ºñ¹ÐÁ¤º¸µéÀÌ °ø°ÝÀÚ¿¡°Ô °ø¸ðµÇ¾ú´Ù°í ÇÏ´õ¶óµµ °ø°ÝÀÚ°¡ ÇØ´ç ³ëµåÀÇ °¡¸í IDµéÀ» »ý¼ºÇÒ ¼ö ÀÖ´Â È®·üÀÌ ¸Å¿ì ³·´Ù. ±×¸®°í º¸¾È ºÐ¼®À» ÅëÇØ Á¦¾ÈµÈ ±¸Á¶°¡ ¹«¼± ¼¾¼­ ³×Æ®¿öÅ©¿¡ ÀûÇÕÇÔÀ» Áõ¸íÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node''s secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.
Å°¿öµå(Keyword) ¼¾¼­ ³×Æ®¿öÅ©(sensor network)   ÀÍ¸í¼º(anonymity)   Çؽ¬ üÀÎ(hash chain)   ÀÎÁõ(authentication)  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå