CFP last date
20 May 2024
Reseach Article

Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

by Inderpreet Kaur, A. L N. Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 11
Year of Publication: 2013
Authors: Inderpreet Kaur, A. L N. Rao
10.5120/12007-7293

Inderpreet Kaur, A. L N. Rao . Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs). International Journal of Computer Applications. 70, 11 ( May 2013), 29-32. DOI=10.5120/12007-7293

@article{ 10.5120/12007-7293,
author = { Inderpreet Kaur, A. L N. Rao },
title = { Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs) },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 11 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number11/12007-7293/ },
doi = { 10.5120/12007-7293 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:36.005078+05:30
%A Inderpreet Kaur
%A A. L N. Rao
%T Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 11
%P 29-32
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services. Such networks are rapidly deployable in the future, so secure wireless environment will be obligatory. In mobile ad hoc networks, due to unreliable wireless media, lack of fixed infrastructure and host mobility, providing secure communications is a big challenge. Because a temporary device recurrently joins or leaves a network, the authentication and security technology should be equipped for the malicious devices used in third-party attacks. Usually, symmetric and asymmetric cryptographic techniques are used for secure communications in wired and wireless networks but they have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks. In mobile ad hoc networks, the processing load and complexity for key management are strongly subject to restriction by the node's available resources like energy and the dynamic nature of network topology. In this paper, Adaptive Group Key Management technique is proposed which uses symmetric key management. The proposed technique diagnoses compromised nodes in their regions by a secure key initially generated by the base stations (BSs). BSs carry out an initial key generation and trust is developed among mobile stations / nodes by another key known as group key. Simulations are done to observe the network performance and the results are very outstanding.

References
  1. Changsheng Miao, Fengling Cao; Dong Chen; Guiran Changl, "A Lightweight Group-Key Management Protocol for Ad Hoc Networks", Genetic and Evolutionary Computing (ICGEC) 2012 Sixth International Conference in: IEEE, pp 288-291
  2. C. Peng Xiao, Jingsha He and Yingfang Fu, "Distributed Group Key Management in Wireless Mesh Networks", International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012.
  3. Georgios Kambourakis, Elisavet Konstantinou, Anastasia Douma, Marios Anagnostopoulos, and Georgios Fotiadis, "Efficient Certification Path Discovery for MANET", "EURASIP Journal on Wireless Communications and Networking" Hindawi Publishing Corporation Volume 2010, Article ID 243985, 16 pages, doi:10. 1155/2010/243985.
  4. Nen-Chung Wang, and Shian-Zhang Fang, "A hierarchical key management scheme for secure group communications in mobile ad hoc networks", Elsevier - The Journal of Systems and Software 80 (2007) 1667–1677.
  5. Kyung-Hyune Rhee, Young-Ho Park, Gene Tsudik "A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks", Journal Of Information Science And Engineering 21, 415-428 (2005).
  6. Jin-Hee Choa, Ing-Ray Chen, "Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networksl", Elsevier Performance Evaluation 68 (2011), pp 58-75, www. elsevier. com/locate/peva.
  7. R. Blom, "An optimal class of symmetric key generation systems", Advances in Cryptology: Proceedings of Euro crypt 84, Lecture Notes in Computer Science, vol. 209, Springer, Berlin, 1984.
  8. H. Deng, A. Mukherjee, D. P. Agrawal, "Threshold and identity-based key management and authentication for wireless ad hoc networks", IEEE International Conferences on Information Technology (ITCC'04), April 5–7, 2004.
  9. D. Cavalcanti, C. M. Cordeiro, D. P. Agrawal, B. Xie, A. Kumar, Issues 37 in integrating cellular networks, WLANs, and MANETs: a futuristic heterogeneous wireless network, in: IEEE Wireless Communications 39 Magazine, June 2005.
  10. Roopal Lakhwani , Sakshi Suhane, Anand Motwani, "Agent based AODV Protocol to Detect and Remove Black Hole Attacks", International Journal of Computer Applications (0975 – 8887) Volume 59– No. 8, December 2012,pp. 35-39.
  11. Tripti nema, akhilesh waoo, PS Patheja, Sanjay Sharma "Energy based AODV Routing Algorithm with Sleep Mode in MANETs", International Journal of Computer Applications (0975 – 8887) Volume 58– No. 19, November 2012, pp. 17-20.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-Hoc Networks (MANET) Group key management Security Intrusion detection Cryptography Trust Key Management Symmetric key