Department
Computer Science
Major
Computer Science
Research Advisor
Madria, Sanjay
Advisor's Department
Computer Science
Funding Source
UMR Opportunities for Undergraduate Research Experiences (OURE) Program
Abstract
Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups.
Biography
David Mullen is a senior attending the University of Missouri-Rolla, majoring in Computer Science and minoring in Russian. David's interests lie particularly in distributed data processing and databases, such as o n the Web, and he seeks a career in research.
Research Category
Engineering
Presentation Type
Poster Presentation
Document Type
Poster
Location
Havener Center, Carver-Turner Room
Presentation Date
11 April 2007, 9:00 am - 11:45 am
Security of Data Collection and Sensor Group Management in Wireless Networks
Havener Center, Carver-Turner Room
Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups.