Department

Computer Science

Major

Computer Science

Research Advisor

Madria, Sanjay

Advisor's Department

Computer Science

Funding Source

UMR Opportunities for Undergraduate Research Experiences (OURE) Program

Abstract

Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups.

Biography

David Mullen is a senior attending the University of Missouri-Rolla, majoring in Computer Science and minoring in Russian. David's interests lie particularly in distributed data processing and databases, such as o n the Web, and he seeks a career in research.

Research Category

Engineering

Presentation Type

Poster Presentation

Document Type

Poster

Location

Havener Center, Carver-Turner Room

Presentation Date

11 April 2007, 9:00 am - 11:45 am

Share

COinS
 
Apr 11th, 9:00 AM Apr 11th, 11:45 AM

Security of Data Collection and Sensor Group Management in Wireless Networks

Havener Center, Carver-Turner Room

Because of their practical applications in monitoring the physical environment and collecting the data for further analysis, sensor networks have become an important area of research within computer science and engineering. Security, in many circumstances, may be a primary concern due to the confidential nature of the data. Since in sensor networks, communication between motes is done via a radio frequency channel (RF), which is not a secure channel, an adversarial node attaching itself to the network could potentially eavesdrop on sensitive data, by listening to any signals which are transmitted. The research shows that a key management protocol, in combination with efficient group management and cryptographic techniques appropriate to energy- and memory-limited sensor networks, such as elliptic curves (ECC), provide a scalable approach for acquiring and maintaining the freshness of keys in large, dynamic groups.