Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Cyclic Group Key Administration Techniques for Multicasting in VANETs

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
D. Sudharani, K. Amrutasagar
10.5120/ijca2017914552

D Sudharani and K Amrutasagar. Cyclic Group Key Administration Techniques for Multicasting in VANETs. International Journal of Computer Applications 168(13):11-13, June 2017. BibTeX

@article{10.5120/ijca2017914552,
	author = {D. Sudharani and K. Amrutasagar},
	title = {Cyclic Group Key Administration Techniques for Multicasting in VANETs},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {13},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {11-13},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume168/number13/27942-2017914552},
	doi = {10.5120/ijca2017914552},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Vehicular Ad Hoc Networks (VANETs) are the most popular application of wireless communication technologies. There are two types of communications i.e.vehicleto vehicle(V to V) and vehicle to road side units (V to RSU). To communicate with other vehicle or to receive services from Trusted authorities (TA) group communication can be held. The group key will be changed during member join into the group or member leave from the group to provide forward secrecy and backward secrecy. To reduce no of rekeying operation this paper proposed cyclic group key administration and provides security member join into the group or member leave from the group to provide forward secrecy and backward secrecy.

References

  1. CarlosdeMoraisCorederioandDharmaPrakashAgarwal,”AdHoc and Sensor Networks: Theory and Applications”
  2. J. Zhou and Y. H. Ou, “Key tree and Chinese remainder theorem based group key distribution scheme”.
  3. Alonso, J.Meta l(1991) “Group theory from a geometrical view point”.
  4. Melisa Hajyvahabzadeh“An efficient group key management using code for key calculations for simulations on join/leave CKCS”.
  5. Y. Hao, Y. Cheng, C. Zhou, and W. Song, “A distributed key management framework with cooperative message authentication in VANETs”.
  6. J.A.M.Naranjo, J.A.L.Ramos, andL.G.Casado,“A suite of algorithms for key distribution and authentication in centralized secure multicast environments”.
  7. P. Vijayakumar, S. Bose, and A. Kannan, “Centralized key distribution protocol using the greatest common divisor method” Comput.Math.

Keywords

Trusted authorities, Vehicular secret key, cyclic group theory, rekeying operations

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs