Abstract
These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Network. IEEE Computer Society, UC Berkeley (2004)
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random function. Journal of the ACM 33(4), 792–807 (1986)
Haekins, D., Carrel, D.: The Internet Key exchange (IKE): RFC 2409, Information Sciences Institute, University of Southern California (1988)
Deng, J., Han, R., Mishra, S.: Enhancing Base Station Security in Wireless Sensor Networks. Technical Report CU-CS-951-03, Department of Computer Science, University of Colorado (2003)
Jolly, G., Kuscu, M.C., Kokate, P.: A Low - energy KeyManagement Protocol for Wireless Sensor Networks. In: Proc. of the 8th IEEE International Symposium on Computers and Communications (2003)
Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor network. In: IEEE Symposium on Research in Security and Privacy (2003)
Chan, H., Perrig, A., Song, D.: Random Key-Assignment for Secure Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN) (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. In: Proceeding of Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom) (2001)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Network and Distributed System Security Symposium, NDSS 2001 (2001)
Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (2000)
Eschenauer, L., Gligor, V.: A Key - Management Scheme for Distributed Sensor Network. In: Proc. of the 9th ACM Conference on Computer and Communications Security (2002)
Deng, J., Han, R., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: Proc. of the 1st ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN) (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Network. In: Proceedings of the 10th ACM CCS 2003 (2003)
Colbourn, C.J., Dinitz, J.H., Stinson, D.R.: Quorum systems constructed from combinatorial designs. Information and Computation, 160–173 (2001)
Lang, S.D., Mao, L.J.: A torus quorum protocol for distributed mutual exclusion. In: Proc. of the 10th Internat. Conference on Parallel and Distributed Computing and Systems, pp. 635–638 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, SJ., Lee, YG., Ko, H., Jun, MS. (2011). Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20975-8_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-20975-8_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20974-1
Online ISBN: 978-3-642-20975-8
eBook Packages: Computer ScienceComputer Science (R0)