Performance Characteristics of Cluster-Based Group Key Management in Mobile Ad Hoc Ne
#1

We propose and analyze a scalable and efficient cluster-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic reconfigurability; we take a cluster-based approach by which group members are broken in to cluster-based subgroups and leaders in subgroups securely communicate with each other to agree on a group key in response to membership change and member mobility events. We show that secrecy requirement for group communication is satisfied. Further, there exists an optimal cluster size that minimizes the total network communication cost as a result of efficiently trading inter-regional vs. intra-regional group key management overheads. We give an analytical expression of the cost involved which allows the optimal cluster size to be identified, when given a set of parameter values characterizing a group communicating system in mobile ad hoc networks.

Many mobile wireless applications nowadays are based on secure group communication by which data is encrypted using an encryption key (called a group key). When a member joins a group, the group key is re keyed so that the new member cannot decrypt the previous messages. This is meant by Backward Secrecy. When a member leaves a group, the group key is re keyed so that the leaving member could not decrypt the messages in future. This is meant by Forward Secrecy.In this paper we propose a reliable and secure cluster-based group key management protocol for secure group communication in mobile ad “hoc networks (MANET). We also propose a Contributory Key Agreement protocol (CKA) for key generation instead of a centralized key server. We break a group in to cluster-based subgroups with a leader in each group. Any changes in these groups will be recorded as a membership change event and other event changes. Each group has a group key and each leader in a group has a leader key, there is also cluster key to identify the clusters. Each of these keys contains information about Id™s of a cluster, group or member.

Conceivably, as the number of group members becomes large, group key management can incur significant overheads and cause a potential system performance bottleneck. For scalability and dynamic management, we propose a two level hierarchical key management architecture adopted from the IETF Group Key Management Architecture to efficiently and securely distribute keys. In our protocol, a leader communicates with the members in the same region using a cluster key. All leaders in the group use a leader key, KLR, for communications among leaders. A group key, KG, is derived from the leader key KG =MAC (KLR, c), where KLR is a leader key and c is a counter to be incremented whenever a group membership change event occurs. The group key (KG) is used for Secure data communications among group members. These three keys are re keyed for secure group communications depending on events that occur in the system.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: load characteristics 3 alternator, characteristics of laser communication, project topics on group key management, performance management, heterogeneity characteristics, resource management group stamford, tmg the management group,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,097 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention 1 793 15-02-2017, 03:24 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 917 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Analyzing the performance of turbo Code mechanical wiki 1 1,236 24-08-2016, 11:38 AM
Last Post: seminar report asees
  Development of a workflow based Complaint Management System (where the complaints are mechanical engineering crazy 5 5,652 28-08-2015, 04:59 AM
Last Post: AlbertFak
  Web Based Blood Bank Management System project report maker 4 12,629 18-04-2015, 07:12 PM
Last Post: Guest
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 21,145 06-03-2015, 07:18 PM
Last Post: unas
  Mobile shop management System computer science technology 7 14,792 01-07-2014, 06:21 PM
Last Post: seminar report asees
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,946 22-02-2013, 03:05 PM
Last Post: seminar details
  controlling a pc using a mobile phone mechanical engineering crazy 4 2,972 08-02-2013, 10:31 AM
Last Post: seminar details

Forum Jump: