CFP last date
20 May 2024
Reseach Article

Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile Adhoc Networks

by D.Suganya Devi, G.Padmavathi
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 23
Year of Publication: 2010
Authors: D.Suganya Devi, G.Padmavathi
10.5120/538-702

D.Suganya Devi, G.Padmavathi . Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile Adhoc Networks. International Journal of Computer Applications. 1, 23 ( February 2010), 46-52. DOI=10.5120/538-702

@article{ 10.5120/538-702,
author = { D.Suganya Devi, G.Padmavathi },
title = { Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile Adhoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 23 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number23/538-702/ },
doi = { 10.5120/538-702 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:01.920969+05:30
%A D.Suganya Devi
%A G.Padmavathi
%T Performance Characteristics of Cluster –Based Multicast Key Distribution Scheme for Mobile Adhoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 23
%P 46-52
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key management is the fundamental challenge in achieving reliable secure communication using multicast key distribution for mobile adhoc networks. This paper proposes and evaluates the performance of an new cluster-based multicast tree algorithm with destination sequenced distance vector routing protocol to provide efficient and reliable multicast key distribution. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of energy, latency, key delivery ratio and packet drop rate under varying network conditions. This proposed scheme achieves reliability, while exhibiting low packet loss rate with high key delivery ratio compared with the existing scheme.

References
  1. T. Chiang and Y. Huang, "Group keys and the multicast security in ad hoc networks", Proc. IEEE International Conference on Parallel Processing, IEEE press, pp 385-390, Oct 2003.
  2. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on ad hoc networks". Proc. 1st ACM workshop on security of ad hoc and sensor networks, ACM Press, pp 94-102.2003.
  3. L. Lazos and R. Poovendram, "Energy-Aware Secure Multicast Communication in Ad Hoc Networks Using Geographical Location Information". Proc.IEEE International Conference on Acoustics Speech and Signal Processing, pp 201-204, Apr 2003.
  4. H. Bettahar, A. Bouabdallah, and M. Alkubeily, "Efficient Key Management Scheme for Secure Application level", IEEE sym. On Computers and Communications, pp 489-497, July 2007.
  5. G.Valle, R.Cardenas, "Overview the Key Management in Adhoc Networks", LCNS 3563, pp 397-406, Aug 2005.
  6. D.Huang, D.Medhi, "A Secure Group Key Management scheme for Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577, June 2008.
  7. B.Kim, H.Cho, J. Lee, "Efficient Key Distribution Protocol for secure Multicast Communication", LCNS 3043, pp 1007-1016, Apr 2004.
  8. Y. Challal, H. Seba, "Group Key Management Protocols: A novel Taxonomy", International Journal of Information Technology pp 105-118, 2005.
  9. L. Dondeti, S. Mukherjee, and A. Samal, "Secure one-to many group communication sing dual encryption", IEEE sym. On Computers and Communications, pp 1-25, Jul 1999.
  10. H. Bettahar, A. Bouabdallah, and Y. Challal, "An adaptive key management protocol for secure multicast", Proc.IEEE International Conference on Computer Communications and Networks, pp 190-195, Oct 2002.
  11. M. Bouassida, I. Chrisment, and O. Festor, "An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks". LCNS 3042, pp 725-742, Apr 2004.
  12. K.Rahman, R.Zaman, A.Reddy, " An Efficient DSDV routing Protocol for Wireless Mobile Adhoc Networks and its Performance Comparison", Proc. European Sym. On Computer Modeling and Simulation, pp 508-511, Nov 2008.
  13. S. Mittra, "Iolus: A framework for scalable secure multicasting", SIGCOMM, pages 277-288, 1997.
  14. Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications", ACM SIGCOMM Computer Communication Review, pp 55-70, April 2004.
  15. M. Bouassida, I. Chrisment, and O. Festor, "Efficient Clustering for Multicast Key Distribution in MANETs", LCNS 3462, pp 138-153, May 2005.
  16. M. Bouassida, I. Chrisment, and O. Festor, "Group Key Management in Manets", International Journal of Network Security, pp 67-79, Jan 2008.
  17. M. Bouassida, I. Chrisment, and O. Festor "Efficient group key management protocol in MANETs using multipoint relaying technique", Proc.IEEE International Conference on Networking, pp 64, Apr. 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Adhoc Networks Multicast Key Distribution Cluster based multicast tree