+ 2C1
≒
C3, and the initiator requires the
computational cost of almost mC3.
SSKM applies a discrete logarithm. The initiator
sends xch to the BS. A peripheral node sends (IDi, yi)
to the BS. y
CH
and yi are extremely large numbers.
Therefore, the communication cost of the initiator is
L2 and that of each peripheral node is almost L3.
In SSKM, the nodes except the initiator calculate
yi =
xi
mod N and equation (1) to obtain a share. The
nodes solve a simultaneous equation processing to
obtain the group key. Therefore, each node requires
the computational cost of almost 2C3+C2
≒
2C3 and
the initiator requires that of almost C3+C2
≒
C3.
Hamasaki et al.’s scheme performs calculations to
obtain the center of a circle by the BS. Therefore, each
peripheral node sends its own ID to the initiator, and
the initiator sends the IDs of the peripheral nodes to
the BS. Each node receives the coordinate of the
center of the circle from the BS. Therefore, the
initiator requires the communication cost of mL1, and
each peripheral node requires that of L1.
In Hamasaki et al.’s scheme, each node generates
m pseudorandom numbers and calculates S using
addition and multiplication. Therefore, each node
requires mC2+C1
≒
mC2.
The scheme proposed in this paper forms multiple
clusters, which allows keeping m as a relatively small
number. The communication cost for each node is the
same as that of Hamasaki et al.’s method. However,
the computational cost of the proposed scheme is the
smallest comparing to other consider methods,
because m is maintained small. Therefore, each node
requires the computational cost of 2C2+C1
≒
2C2.
5 APPLICATION EXAMPLE
The proposed scheme is characterized by easy group
key update. Therefore, we can present applications
where only authorized people can receive service in
unpartitioned space. To build an analogy, let us
consider a hypothetical room where people who have
a communication device frequency enter and exit.
However, it is not necessary for a room to be
surrounded by a wall, which would cut off
communication. Let us consider that a service, which
is operated in the room is e-sports, established such
as only authorized people sharing a common group
key can use it. The game of e-sports is projected to a
big screen in the room, and only the people in the
room can share the information. When a person exits
the room, the group key is immediately updated to
remove that person from the group. Therefore, he
loses access to the service at the moment when he
leaves the room. Subsequently, when someone enters
the room, the group key is updated to include this new
person and he can obtain access to the service.
Therefore, it is easy to respond to services that are
frequently updated by participants using the proposed
scheme.
6 CONCLUSION
We proposed an efficient key-sharing scheme, which
implies dividing into clusters to decrease
computational cost. In future work, we would like to
consider pairwise key sharing, and propose a method
using pairwise key sharing and group key sharing.
REFERENCES
Estrin, D. et al, 1999. Next century challenges: scalable
coordination in sensor networks. In Mobile Computing
and Networking (Mobi- Com’99), Seattle, WA, pp.263-
270
Hamasaki, J. et al, 2016 “Geometric Group Key-Sharing
Scheme,” Global Conference on Consumer Electronics
Pages 667-668.
Zhu, S. et al, 2003. LEAP: Efficient Security Mechanisms
for Large-ScaleDistributed Sensor Networks, In ACM
Conference on Computer and Communications
Security, pp.62-72.
Zhu, S. et al, LEAP+: Efficient security mechanisms for
large-scale distributed sensor netwoeks, In ACM Trans.
On Sensor Networks (TOSN), Vol.2, Issue 4, pp. 500-
528, 2006.
Porambage, P. et al, 2015. Multicast Communication in
Wireless Sensor Networks Deployed for IoT
Applications, In IEE Access pp. 1503–1511.
Zhang, Y. et al, 2013. A Secret Sharing-Based Key
Management in Hierarchical Wireless Sensor Network,
In International Journal of Distributed Sensor
Networks Volume.