Skip to main content

Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms

  • Conference paper
AsiaSim 2007 (AsiaSim 2007)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 5))

Included in the following conference series:

Abstract

The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pietro, R.D., Mancini, L.V., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. AdHoc Network 1, 455–468 (2003)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal 38, 393–422 (2002)

    Article  Google Scholar 

  3. Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group Key management scheme for large-scale sensor networks. Ad Hoc Network 3, 668–688 (2005)

    Article  Google Scholar 

  4. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Suvey on Sensor Networks. IEEE Communications Magazine 40, 102–114 (2002)

    Article  Google Scholar 

  5. Sahoo, P.K., Chen, J.J.-R., Sun, P.-T.: Efficient Security Mechanisms for the Distributed Wireless Sensor Networks. ICITA’50 (2005)

    Google Scholar 

  6. Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Wireless Sensor Networks. In: IEEE International Conference Performance on Computing, and Communications, pp. 813–818 (2004)

    Google Scholar 

  7. Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor networks security. NAI Technical Report (2000)

    Google Scholar 

  8. Jolly, G., Kuscu, M., Kokate, P.: A hierarchical key management method for low-energy wireless sensor networks. UMBC Online Document (2002)

    Google Scholar 

  9. Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: IEEE 2003 Symposium on Security and Privacy (2003)

    Google Scholar 

  10. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM CCS, 27–31 (2003)

    Google Scholar 

  11. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF RFC 2627 (1999)

    Google Scholar 

  12. Pottie, G.J., Kaiser, W.J.: Wireless Integrated Network Sensors. Communications of the ACM 43, 51–58 (2000)

    Article  Google Scholar 

  13. Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE ACM T. Network 11(1), 2–16 (2003)

    Article  Google Scholar 

  14. Heideman, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building Efficient Wireless Sensor Networks with Low-Level Naming. In: Proc. of SOSP, pp. 146–159 (2001)

    Google Scholar 

  15. Chi, S.H., Cho, T.H.: Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 58–67. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  17. Kim, J.M., Cho, T.H.: A* based Key Tree Structure Generation for Group Key Management in Wireless Sensor Networks. Computer Communications, Elsevier (submitted, 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jin-Woo Park Tag- Gon Kim Yun-Bae Kim

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, J.M., Lee, H.Y., Cho, T.H. (2007). Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms. In: Park, JW., Kim, T.G., Kim, YB. (eds) AsiaSim 2007. AsiaSim 2007. Communications in Computer and Information Science, vol 5. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77600-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77600-0_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77599-7

  • Online ISBN: 978-3-540-77600-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics