Abstract
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2006-C1090-0603-0028).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pietro, R.D., Mancini, L.V., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. AdHoc Network 1, 455–468 (2003)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal 38, 393–422 (2002)
Eltoweissy, M., Wadaa, A., Olariu, S., Wilson, L.: Group Key management scheme for large-scale sensor networks. Ad Hoc Network 3, 668–688 (2005)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Suvey on Sensor Networks. IEEE Communications Magazine 40, 102–114 (2002)
Sahoo, P.K., Chen, J.J.-R., Sun, P.-T.: Efficient Security Mechanisms for the Distributed Wireless Sensor Networks. ICITA’50 (2005)
Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight Key Management for Wireless Sensor Networks. In: IEEE International Conference Performance on Computing, and Communications, pp. 813–818 (2004)
Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor networks security. NAI Technical Report (2000)
Jolly, G., Kuscu, M., Kokate, P.: A hierarchical key management method for low-energy wireless sensor networks. UMBC Online Document (2002)
Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: IEEE 2003 Symposium on Security and Privacy (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM CCS, 27–31 (2003)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF RFC 2627 (1999)
Pottie, G.J., Kaiser, W.J.: Wireless Integrated Network Sensors. Communications of the ACM 43, 51–58 (2000)
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE ACM T. Network 11(1), 2–16 (2003)
Heideman, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building Efficient Wireless Sensor Networks with Low-Level Naming. In: Proc. of SOSP, pp. 146–159 (2001)
Chi, S.H., Cho, T.H.: Fuzzy Logic based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà , A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 58–67. Springer, Heidelberg (2006)
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)
Kim, J.M., Cho, T.H.: A* based Key Tree Structure Generation for Group Key Management in Wireless Sensor Networks. Computer Communications, Elsevier (submitted, 2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J.M., Lee, H.Y., Cho, T.H. (2007). Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms. In: Park, JW., Kim, T.G., Kim, YB. (eds) AsiaSim 2007. AsiaSim 2007. Communications in Computer and Information Science, vol 5. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77600-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-540-77600-0_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77599-7
Online ISBN: 978-3-540-77600-0
eBook Packages: Computer ScienceComputer Science (R0)