Skip to main content

Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment

  • Conference paper
Ubiquitous Computing and Multimedia Applications (UCMA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 150))

Abstract

These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Network. IEEE Computer Society, UC Berkeley (2004)

    Google Scholar 

  2. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random function. Journal of the ACM 33(4), 792–807 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  3. Haekins, D., Carrel, D.: The Internet Key exchange (IKE): RFC 2409, Information Sciences Institute, University of Southern California (1988)

    Google Scholar 

  4. Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks. Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado (2003)

    Google Scholar 

  5. Jolly, G., Kuscu, M.C., Kokate, P.: A Low - energy KeyManagement Protocol for Wireless Sensor Networks. In: Proc. of the 8th IEEE International Symposium on Computers and Communications (2003)

    Google Scholar 

  6. Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor network. In: IEEE Symposium on Research in Security and Privacy (2003)

    Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random Key-Assignment for Secure Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN) (2003)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. In: Proceeding of Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom) (2001)

    Google Scholar 

  9. Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (2001)

    Google Scholar 

  10. Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  11. Eschenauer, L., Gligor, V.: A Key - Management Scheme for Distributed Sensor Network. In: Proc. of the 9th ACM Conference on Computer and Communications Security (2002)

    Google Scholar 

  12. Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN) (2003)

    Google Scholar 

  13. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Network. In: Proceedings of the 10th ACM CCS 2003 (2003)

    Google Scholar 

  14. Colbourn, C.J., Dinitz, J.H., Stinson, D.R.: Quorum systems constructed from combinatorial designs. Information and Computation, 160–173 (2001)

    Google Scholar 

  15. Lang, S.D., Mao, L.J.: A torus quorum protocol for distributed mutual exclusion. In: Proc. of the 10th Internat. Conference on Parallel and Distributed Computing and Systems, pp. 635–638 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jang, SJ., Lee, YG., Ko, H., Jun, MS. (2011). Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20975-8_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20975-8_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20974-1

  • Online ISBN: 978-3-642-20975-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics