CFP last date
20 May 2024
Reseach Article

Trust based Cluster Computing in Ad hoc Network using Group Key Climbing and Chaining (GKC^2)

by S. Vijayalakshmi, P. Annadurai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 16
Year of Publication: 2013
Authors: S. Vijayalakshmi, P. Annadurai
10.5120/12825-0089

S. Vijayalakshmi, P. Annadurai . Trust based Cluster Computing in Ad hoc Network using Group Key Climbing and Chaining (GKC^2). International Journal of Computer Applications. 73, 16 ( July 2013), 20-25. DOI=10.5120/12825-0089

@article{ 10.5120/12825-0089,
author = { S. Vijayalakshmi, P. Annadurai },
title = { Trust based Cluster Computing in Ad hoc Network using Group Key Climbing and Chaining (GKC^2) },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 16 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number16/12825-0089/ },
doi = { 10.5120/12825-0089 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:16.216144+05:30
%A S. Vijayalakshmi
%A P. Annadurai
%T Trust based Cluster Computing in Ad hoc Network using Group Key Climbing and Chaining (GKC^2)
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 16
%P 20-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cluster computing in ad hoc network draws special attention among the research community as it mandates the usage of single bandwidth for many receivers associated with the group/cluster. Ad hoc network operational environment has incited the adoption of cluster computing as it innately assists its formation. Cluster computing in ad hoc network has undergone a paradigm shift in the deployment of community centric applications like multiparty video conferencing, multiplayer online video games, online software patch update and online auction etc. Clusters in ad hoc network collaborate with each other through trust based routing using group key GK. Cluster members in the group are in possession of three keys namely a private key for decryption, public key for encryption for one-one communication between the group members and the local group key (LGK) for corresponding with the group head and broadcasting the message to other peers. Group head handshakes with other group members using the established and recommended LGK. The global group key (G2K) possessed by each group head aids in inter group communication for encrypting the group message and the LGK for decrypting the enciphered group message. The inter collaboration between the clusters necessitates strong association among the group keys namely LGK and G2K triggering upscale/upward group communication through efficient group key climbing and chaining mechanism. The cluster key pool viz. the group key associated with the group head and the group member's key are established during the set up and connection phase that sustains until the clusters encounters one of these special conditions. Group head drifting from the cluster, a node joining/leaving to/from a cluster (forward and backward secrecy), compromised keys, and periodical key updates induces a rekey mechanism for the cluster. The storage, computation and communication complexity involved in key generation and exchange mechanism leverages trust based cluster routing in ad hoc network.

References
  1. V. Varadharajan, R. Shankaran and M. Hitchens, "Security for cluster based ad hoc Networks", Elsevier Computerscience. com, Computer communications, October 2003.
  2. Anupama, M. , and Sathyanarayana, B. , "Survey of Cluster Based Routing Protocols in Mobile Ad hoc Networks", International Journal of Computer Theory and Engineering, Vol. 3, No. 6, December 2011
  3. Renuka, A. T. , and Shetty, K. C. , "Cluster Based Group Key Management in Mobile Ad hoc Networks", International Journal of Computer Science and Network Security, VOL. 9 No. 4, April 2009
  4. Venkataramanan, V. , Shankar, K. , Vinoth, D. , Archana, S. , "Analysis of Cluster Based Zone Routing Protocol in MANET through Network Simulator" International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-3, February 2013
  5. Bheemalingaiah, M. , Naidu, M. M. , Rao, D. S. , "Energy Aware Clustered Based Multipath Routing in Mobile Ad Hoc Networks", I. J. Communications, Network and System Sciences, 2009, pp. 91-168 Published Online May 2009 in SciRes (http://www. SciRP. org/journal/ijcns/).
  6. Gupta, N. , Shrivastava, M. , Singh, A. , "Greedy Cluster Head Selection Based Routing Protocol for Mobile Ad Hoc Networks" , International Conference on Electrical Engineering and Computer Science Engineering (ICEECS) 16th Sept, 2012, Pune- ISBN: 978-93-82208-18-1
  7. Ferdous, R. , Muthukkumarasamy, V. , Sithirasenan, E. , "Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks" IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), during 16-18 Nov 2011, pp. 589 - 596
  8. Gazdar, T. , Benslimane, A. , Belghith, A. , "Secure Clustering Scheme Based Keys Management in VANETs" Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd during 15-18 May 2011, pp. 1-5
  9. Rachedi, A. , Benslimane, A. , "Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks", International Conference on Systems and Networks Communications, 2006. ICSNC '06. Pp. 72.
  10. Elhdhili, M. E. , Kamoun, B. F. , "Reputation based clustering algorithm for security management in ad hoc networks with liars Third International Conference on Risks and Security of Internet and Systems, 2008. CRiSIS '08. During 28-30 Oct. 2008 pp. 141-148
  11. Narasimha, C. , and Jalaja Kumari, B. ," Efficient and Secured Multicasting Over MANET's through EGMP", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 5, May 2012 ISSN: 2277 128X, pp. 169-172.
Index Terms

Computer Science
Information Sciences

Keywords

Cluster based routing Local Group key Global group key cluster head selection Rekeying