Vitality and peripatetic sustain cluster key management schemes in MANET
-
2018-02-05 https://doi.org/10.14419/ijet.v7i1.7.9385 -
MANET, Cluster, Group Key, Key Management. -
Abstract
A mobile Ad Hoc network (MANET) is aself-configuring, structure-less network of devices connected wirelessly. The disseminated nature of MANETs signifiesaunrivaledresponsibility to security architects. Key management is essential part of securitythis issue is considerably greater in MANETs. In view of dynamic nature of MANETs, when a node leaves or goes along with it have to produce new session key to hold forward and backward secrecy. Our proposed scheme focus in: 1) Cluster establishment 2) Link consistency 3) Cluster key Generation. The individual node residences are proven andthe nodes are ordered into clusters totally on their transmission series. Utilizing this, an advanced technique is invoked for the cluster head determination and cluster development. The proposedscheme saves time and vitality for common cluster updations and key updations. . To prevent the non-group memberships from deciphering the information, complicated key called Group Key is being created. The confidentiality of the Group key is being maintained. Group key evadethe issue of authentications and third partyparticipation. Recurrent updations, the chance of key hacking and replacing certificates are being decreased. The outcomes demonstrate that the throughput, existence time of the nodes, link consistency is expanded with least utilization of vitality. Our proposed scheme additionally reduces overhead, end-end delay and packet loss. The quantity of key updations is being reduced in our proposed framework and link consistency is retained.
-
References
[1] S.Thylashri, C.Shanmuganathan, Dr.P.Raviraj “Dynamism and Reminiscence-Capable Key Management Technique for Portable Heterogeneous Sensor Networks†International Journal of Engineering Trends and Technology (IJETT) –Volume 31 Number 3-January 2016.
[2] Foad Salem Mubarek, Sufyan T. Faraj Al-Janabi,†Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol†Sixth International Conference on Developments in eSystems Engineering, December 2013 ISSN: 2161-1343.
[3] Jenitha ,Jayashree,†Distributed Trust Node Selection for Secure Group Communication in MANETâ€, Fourth International Conference on Advances in Computing and Communications, September 2014.
[4] BassantSelim, Chan YeobYeun,†Key Management for the MANET: A Surveyâ€, International Conference on Information and Communication Technology Research (ICTRC2015).
[5] K. Drira, H. Seba, and H. Kheddouci, “ECGK: an efficient clustering scheme for group key management in MANETs,†Computer Communications, vol. 33, no. 9, pp. 1094–1107, 2010. https://doi.org/10.1016/j.comcom.2010.02.007.
[6] D. S. Devi and G. Padmavathi, “A reliable secure multicast key distribution scheme for mobile Adhoc networks,†World Academy of Science, Engineering and Technology, vol. 56, pp. 321–326, 2009.
[7] J.-C. Lin, K.-H. Huang, F. Lai, and H.-C. Lee, “Secure and efficient group key management with shared key derivation,†Computer Standards & Interfaces, vol. 31, no. 1, pp. 192–208, 2009. https://doi.org/10.1016/j.csi.2007.11.005.
[8] D. Huang and D. Medhi, “A secure group key management scheme for hierarchical mobile Ad hoc networks,†Ad Hoc Networks, vol. 6, no. 4, pp. 560–577, 2008. https://doi.org/10.1016/j.adhoc.2007.04.006.
[9] Mohamed-Salah Bouassida, Isabelle Chrisment, and Olivier Festor, “Group Key Management in MANETs,†International Journal of Network Security, vol. 6, no. 1, pp. 67-79, 2008.
[10] Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan, “The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Networkâ€, International Symposium on Computer, Consumer and Control, 2016. https://doi.org/10.1109/IS3C.2016.121.
-
Downloads
-
How to Cite
Thylashri, S., Femi, D., Alex David, S., & Suresh, A. (2018). Vitality and peripatetic sustain cluster key management schemes in MANET. International Journal of Engineering & Technology, 7(1.7), 43-46. https://doi.org/10.14419/ijet.v7i1.7.9385Received date: 2018-02-04
Accepted date: 2018-02-04
Published date: 2018-02-05