A key management and vulnerable area detection scheme for secure pervasive environments

Hayoung Oh, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless Sensor Networks (WSNs) is a very attractive technique to support Ubiquitous Pervasive Computing (UPC) due to many merits such as compact form, low-power, and potential low cost. However, the more the number of sensor node is increased, the more difficult the manager monitors WSNs individually. And faults of the sensing value are common due to the artificial attacker and the lack of physical protection. Therefore, we propose a key management and distributed abnormal area scanning scheme using spatial, temporal correlation and in-network aggregation for secure UPC. Simulations show that our scheme can clearly identify the abnormal sensors with high accuracy even in the existence of normal sensors, abnormal sensor, and event-detecting sensors. In addition, we show that the delivery ratio is increased under various network environments through the key management scheme.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Pages1107-1112
Number of pages6
DOIs
StatePublished - 2008
Event3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008 - Busan, Korea, Republic of
Duration: 11 Nov 200813 Nov 2008

Publication series

NameProceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Volume2

Conference

Conference3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008
Country/TerritoryKorea, Republic of
CityBusan
Period11/11/0813/11/08

Keywords

  • Abnormal
  • Fault
  • Key management
  • Normal
  • Security
  • Sensor
  • Ubiquitous Pervasive Computing (UPC)

Fingerprint

Dive into the research topics of 'A key management and vulnerable area detection scheme for secure pervasive environments'. Together they form a unique fingerprint.

Cite this