Document Type
Article
Publication Date
2007
DOI
10.1080/15501320601062080
Publication Title
International Journal of Distributed Sensor Networks
Volume
3
Issue
3
Pages
273-287
Abstract
This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) of their multicast regions. We find that power consumption issues provide a natural trade-off that determines optimal values for these parameters. Analysis of one application shows an increase in system security with 70-80% less power overhead than existing security approaches.
Original Publication Citation
Brooks, R.R., Pillai, B., Weigle, M.C., & Pirretti, M. (2007). Optimal layout of multicast groups using network embedded multicast security in ad hoc sensor networks. International Journal of Distributed Sensor Networks, 3(3), 273-287. doi: 10.1080/15501320601062080
Repository Citation
Brooks, R.R., Pillai, B., Weigle, M.C., & Pirretti, M. (2007). Optimal layout of multicast groups using network embedded multicast security in ad hoc sensor networks. International Journal of Distributed Sensor Networks, 3(3), 273-287. doi: 10.1080/15501320601062080
ORCID
0000-0002-2787-7166 (Weigle)