CFP last date
20 May 2024
Reseach Article

Cyclic Group Key Administration Techniques for Multicasting in VANETs

by D. Sudharani, K. Amrutasagar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 168 - Number 13
Year of Publication: 2017
Authors: D. Sudharani, K. Amrutasagar
10.5120/ijca2017914552

D. Sudharani, K. Amrutasagar . Cyclic Group Key Administration Techniques for Multicasting in VANETs. International Journal of Computer Applications. 168, 13 ( Jun 2017), 11-13. DOI=10.5120/ijca2017914552

@article{ 10.5120/ijca2017914552,
author = { D. Sudharani, K. Amrutasagar },
title = { Cyclic Group Key Administration Techniques for Multicasting in VANETs },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2017 },
volume = { 168 },
number = { 13 },
month = { Jun },
year = { 2017 },
issn = { 0975-8887 },
pages = { 11-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume168/number13/27942-2017914552/ },
doi = { 10.5120/ijca2017914552 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:16:03.053378+05:30
%A D. Sudharani
%A K. Amrutasagar
%T Cyclic Group Key Administration Techniques for Multicasting in VANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 168
%N 13
%P 11-13
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vehicular Ad Hoc Networks (VANETs) are the most popular application of wireless communication technologies. There are two types of communications i.e.vehicleto vehicle(V to V) and vehicle to road side units (V to RSU). To communicate with other vehicle or to receive services from Trusted authorities (TA) group communication can be held. The group key will be changed during member join into the group or member leave from the group to provide forward secrecy and backward secrecy. To reduce no of rekeying operation this paper proposed cyclic group key administration and provides security member join into the group or member leave from the group to provide forward secrecy and backward secrecy.

References
  1. CarlosdeMoraisCorederioandDharmaPrakashAgarwal,”AdHoc and Sensor Networks: Theory and Applications”
  2. J. Zhou and Y. H. Ou, “Key tree and Chinese remainder theorem based group key distribution scheme”.
  3. Alonso, J.Meta l(1991) “Group theory from a geometrical view point”.
  4. Melisa Hajyvahabzadeh“An efficient group key management using code for key calculations for simulations on join/leave CKCS”.
  5. Y. Hao, Y. Cheng, C. Zhou, and W. Song, “A distributed key management framework with cooperative message authentication in VANETs”.
  6. J.A.M.Naranjo, J.A.L.Ramos, andL.G.Casado,“A suite of algorithms for key distribution and authentication in centralized secure multicast environments”.
  7. P. Vijayakumar, S. Bose, and A. Kannan, “Centralized key distribution protocol using the greatest common divisor method” Comput.Math.
Index Terms

Computer Science
Information Sciences

Keywords

Trusted authorities Vehicular secret key cyclic group theory rekeying operations