Abstract. Wireless Sensor is used for military purpose, machine management, cultural properties management, etc. However, sensor being transmitted in wireless network channel, relay attack, eavesdropping, and replay attack have occurred. Also, because the sensor's hardware arithmetic operation capacity is very limited (low cost), it has various security vulnerabilities for which a solution has not yet been developed. Thus, this paper proposed the light-weight distance-bounding mutual authentication security scheme based on the limited hardware computing capability. The proposed scheme is safe against all security vulnerabilities that could occur in sensor network and can be efficiently used for group sensor management because of its ability to authenticate multiple sensors simultaneously and to show efficient performance.Keywords: Distance-Bounding, Group Authentication, Light-Weight, Mutual Authentication, Sensor Network.
IntroductionSensor network is consisted of a sensor node to transmit information detected through sensing to a sink, in other words, a server via cluster header or base station. It is used for various purposes including military purpose, cultural properties management, road management, etc. Also, it is able to perform such functions as temperature detection, motion detection, humidity detection, etc.Given the nature of communication based on wireless network, sensor node was easily exposed to such vulnerabilities as key leakage, eavesdropping, replay attack, etc. from the initial phase of commercialization. As a result, a variety of security techniques have been developed. To date, the sensor node to support even for RC5, open key, etc. was developed.However, as for the sensor node that has a very limited capability as compared with hardware arithmetic operation capacity such as smart dust, etc. and those sensor nodes having different energy sources, it is inappropriate to use the encryption and security communication, which are requiring a high arithmetic operation to be used in the existing studies. Moreover, those previous studies on the prevention of relay attack were focused on the detection of sensor node location through network topology, RF