Isi Artikel Utama

Hoon Ko
Kita Bae
Department of New Media, Korean German Institute of Technology
United States
Goreti Marreiros
Institute of Engineering Polytechnic of Porto
Haengkon Kim
Department of Computer and Communications, Catholic University of Daegu
Korea, Republic of
Hyun Yoe
Department of Information and Communication Engineering, Sunchon National University
Korea, Republic of
Carlos Ramos
Institute of Engineering Polytechnic of Porto
Vol. 3 No. 3 (2014), Articles, pages 43-53
How to Cite


Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.


Download data is not yet available.

Rincian Artikel


BRACHMANN, M., KEOH, S. L., MORCHON, O. G., KUMAR, S. S. End-to-end transport security in the IP-based internet of things. Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN '12), 2012.

CHEN, C. M., LIN, Y. H., CHEN, Y. H., SUN, H. M. Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn. Journal of Information Hiding and Multimedia Signal Processing, 2013.

CHEN, C.-M., LIN, Y.-H., LIN, Y.-C., SUN, H.-M. RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 2012.

HU, W., TAN, H., CORKE, P., SHIH, W. C., JHA, S. Toward trusted wireless sensor Networks. ACM Transactions on Sensor Networks, 2010.

JOKHIO, S. H., JOKHIO, I. A., KEMP, A. H. Node capture attack detection and defence in wireless sensor networks. IET Wireless Sensor Systems, 2012.

KHAN, S. U., LAVAGNO, L., PASTRONE, C. A key management scheme supporting node mobility in heterogeneous sensor networks. Proceedings of the 6th International Conference on Emerging Technologies (ICET '10), 2010.

KO, H., JANG, U., KIM, S., SHIN, Y. An Effective Group Management Method for Secure Multicast Transmission. The Korean Institute of Information Scientists and Engineers, 2006.

KO, H., LEE, Y., SUNG, K., OH, H., SHIN, Y. A Study on an Effective Group Management Scheme for Secure Multicast in MIPv6. ISA2008, 2008.

LIN, Y., ZHANG, J., CHUNG, H. S.-H., IP W. H., LI, Y., SHI, Y.-H. An ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks. IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, 2012.

LIU, Y., LI, J., GUIZANI, M. PKC based broadcast authentication using signature amortization for WSNs. IEEE Transactions on Wireless Communications, 2012.

ROMAN, R., ZHOU, J., LOPEZ, J. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 2013.

SHI, Q., ZHANG, N., MERABTI, M., KIFAYAT, K., Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 2013.

SHIH, H.-C., HO, J.-H., LIAO, B.-Y., PAN, J.-S. Hierarchical gradient diffusion algorithm for wireless sensor networks. Applied Artificial Intelligence in Recent Trends, 2013

WEBER, R. H. Internet of things—new security and privacy challenges. Computer Law and Security Review, 2010.

WINTER, T., THUBERT, P., BRANDT, A. et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. IETF RFC 6550, 2012.

ZHU, F., MUTKA, M. W., NI, L. M. Private entity authentication for pervasive computing environments. International Journal of Network Security, 2012.