CFP last date
22 July 2024
Reseach Article

An Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs

by N. Vimala, B. Jayaram, Dr. R. Balasubramanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 19 - Number 2
Year of Publication: 2011
Authors: N. Vimala, B. Jayaram, Dr. R. Balasubramanian

N. Vimala, B. Jayaram, Dr. R. Balasubramanian . An Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs. International Journal of Computer Applications. 19, 2 ( April 2011), 44-51. DOI=10.5120/2330-3029

@article{ 10.5120/2330-3029,
author = { N. Vimala, B. Jayaram, Dr. R. Balasubramanian },
title = { An Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 19 },
number = { 2 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 44-51 },
numpages = {9},
url = { },
doi = { 10.5120/2330-3029 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T20:05:59.176543+05:30
%A N. Vimala
%A B. Jayaram
%A Dr. R. Balasubramanian
%T An Efficient Rekeying Function Protocol with Multicast Key Distribution for Group Key Management in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 19
%N 2
%P 44-51
%D 2011
%I Foundation of Computer Science (FCS), NY, USA

Key management in the ad hoc network is a challenging issue concerning the security of the group communication. Group key management protocols can be approximately categorized into three: centralized, decentralized, and distributed. The much apt solution to provide the services like authentication, data integrity and data confidentiality is the establishment of a key management protocol. This paper proposes an approach for the design and analysis of region-based key management protocols with a new multicast key distribution scheme for scalable and reconfigurable group key management in Mobile Ad Hoc Networks (MANETs). The region-based group key management protocol partitions a group into region-based subgroups based on decentralized key management principles by using the Novel Re-Keying Function Protocol (NRFP). An issue is aroused by most of the centralized key management protocols on data security on group communication. The proposed system significantly reduces the computation complexity. Instead using conventional encryption algorithms, the proposed scheme employs an MDS code which is a class of error control codes, to distribute multicast key dynamically. This scheme considerably reduces the computation load of each group member compared to existing schemes employing traditional encryption algorithms. Such a scheme is advantageous for many wireless applications where portable devices or sensors need to reduce their computation as much as possible because of battery power limitations. Simply combined with any key-tree-based schemes, this scheme affords much lower computation complexity while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution.

  1. A. Renuka, and K. C. Shet, “Cluster Based Group Key Management in Mobile Ad hoc Networks,” IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 4, pp. 42-49, 2009.
  2. S. Rafaeli, and D. Hutchison, “A survey of key management for secure group communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309–329, 2003.
  3. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang, “Security in mobile Ad-Hoc networks-Challenges and Solutions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 38-47, 2004.
  4. Mohamed-Salah Bouassida, Isabelle Chrisment, and Olivier Festor, “Group Key Management in MANETs,” International Journal of Network Security, vol. 6, no. 1, pp. 67-79, 2008.
  5. L. Lazos, and R. Poovendram, “Energy-aware secure multicast communication in Ad Hoc networks using geographical location information,” in IEEE International Conference on Acoustics Speech and Signal Processing, pp. 201-204, 2003.
  6. J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “On the construction of energy-efficient broadcast and multicast trees in wireless networks,” in INFOCOM 2000, pp. 585-594, 2000.
  7. Menezes, P. V. Oorschot, and S. A. Vanstone, “handbook of Applied Cryptography”, CRC Press, New York, 1997.
  8. C. E. Perkins, “Ad hoc networking”, Addison-Wesley Pub Co, 1st edition December 29, 2000.
  9. Chadi Maghmoumi, Hafid Abouaissa, Jaafar Gaber, and Pascal Lorenz, “A Clustering-Based Scalable Key Management Protocol for Ad Hoc Networks,” Second International Conference on Communication Theory, Reliability, and Quality of Service, pp.42-45, 2009.
  10. Nen-Chung Wang, and Shian-Zhang Fang, “A hierarchical key management scheme for secure group communications in mobile ad hoc networks,” Journal of Systems and Software, vol. 80, no. 10, pp. 1667-1677, 2007.
  11. George C. Hadjichristofi, William J. Adams, and Nathaniel J. Davis, “A Framework for Key Management in Mobile Ad Hoc Networks,” International Journal of Information Technology, vol. 11, no. 2, pp. 31-61, 2006.
  12. Rony H. Rahman, and Lutfar Rahman, “A New Group Key Management Protocol for Wireless Ad-Hoc Networks,” International Journal of Computer and Information Science and Engineering, vol. 2, no. 2, pp. 74-79, 2008.
  13. M. Bechler, H. -J. Hof, D. Kraft, F. Pählke, and L. Wolf, “A Cluster-Based Security Architecture for Ad Hoc Networks,” Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, vol. 4, pp. 2393-2403, 2004.
  14. Yi Jim Chen, Yi Ling Wang, Xian Ping Wu, and Phu Dung Le, “The Design of Cluster-based Group Key Management System in Wireless Networks,” pp. 1-4, 2006.
  15. Jason H. Li, Renato Levy, Miao Yu, and Bobby Bhattacharjee, “A scalable key management and clustering scheme for ad hoc networks,” Proceedings of the 1st international conference on Scalable information systems, 2006.
  16. Jin-Hee Cho, “Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks,” Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University.
  17. J. W. Wilson, and I. R. Chen, “Performance Characteristics of Location-based Group Membership and Data Consistency Algorithms in Mobile Ad hoc Networks,” International Journal of Wireless and Mobile Computing, vol. 1, no. 8, 2005.
  18. A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 24, no. 11, pp. 612-613, Nov. 1979.
  19. R.J. McEliece and D.V. Sarwate, “On Sharing Secrets and Reed-Solomon Codes,” Comm. ACM, vol. 26, no. 9, pp. 583-584, Sept.1981.
  20. R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Advances in Cryptology—Proc. Workshop Theory and Application of Cryptographic Techniques (EUROCRYPT ’84), pp. 335-338, 1984.
  21. B. Schneier, Applied Cryptography, second ed. John Wiley & Sons, 1996.
  22. I.S. Reed and G. Solomon, “Polynomial Codes over Certain Finite Fields,” J. SIAM, vol. 8, no. 10, pp. 300-304, 1960.
Index Terms

Computer Science
Information Sciences


Cluster Head Group Key Key Management Protocol Mobile Ad Hoc Networks (MANETs) Region-based and Rekeying multicast MD5 codes erasure decoding