CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs

by B. Gopalakrishnan, A. Shanmugam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 6
Year of Publication: 2013
Authors: B. Gopalakrishnan, A. Shanmugam
10.5120/14019-2176

B. Gopalakrishnan, A. Shanmugam . A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs. International Journal of Computer Applications. 81, 6 ( November 2013), 44-49. DOI=10.5120/14019-2176

@article{ 10.5120/14019-2176,
author = { B. Gopalakrishnan, A. Shanmugam },
title = { A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 6 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number6/14019-2176/ },
doi = { 10.5120/14019-2176 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:24.368808+05:30
%A B. Gopalakrishnan
%A A. Shanmugam
%T A Pythagorean Tree based Key Generation Algorithm for Secure Group Communication in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 6
%P 44-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An efficient and secure group communication in Mobile Adhoc Network (MANETs) has brought attention to many security issues. In this paper, we propose Energy Efficient Dynamic Core based Multicast Routing Protocol to establish the path between the nodes that participate in group communication. During the routing process each node computes a Pythagorean Triple and constructs a Pythagorean Triple Tree (PTT) to generate a Contributory Key. Each node computes a pair of keys which will be exchanged among the nodes to compute group key for secure group communication. The rekeying operation is performed when the node join/leave the group. The proposed approach was analyzed on Computational cost, Group Formation, Percentage of Rekeying of nodes and Communicational cost with respect to Group Size. It reduces computational and communicational cost of the secure group communication when compared with other protocols.

References
  1. Anahita Mortazavi (2011) "An Efficient Distributed Group Key Management using Hierarchical Approach with Diffie-Hellman and Symmetric Algorithm: DHSA" International Symposium on Computer Networks and Distributed Systems (CNDS),PP 49 – 54, February 23-24, 2011.
  2. Beattie and Weatherby (2005), "Pythgorean Triples and Units in Integral Group Rings",Journal of Algebra and its applications, Vol 4, Issue 5, 2005.
  3. Chu-Hsing Lin and Chen-Yu Lee (2010), "Modified Autonomous Key Management Scheme with Reduced Communication /Computation Costs in MANET" International Conference on Complex, Intelligent and Software Intensive Systems PP 818 – 821, 2010.
  4. Lu Li, Ze Wang, Wenju Liu and Yun long Wang (2011) "A Certificateless Key Management Scheme in Moblie Ad Hoc Networks" 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM),PP 1-4, 2011.
  5. JikaiTeng and Chuankun (2012) "A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds" JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 14, NO. 1, PP 104-110 , FEBRUARY 2012.
  6. Min-Ho Park ,Young-Hoon Park, Han-You Jeong and Seung-Woo Seo, (2013) "Key Management for Multiple Multicast Groups in Wireless Networks" IEEE Transactions On Mobile Computing, Vol. 12, No. 9,Pp 1712-1723, September 2013
  7. NiteshSaxena and Jeong Hyun Yi (2009) "Non interactive Self-Certification for Long-Lived Mobile Ad Hoc Networks" IEEE Transactions On Information Forensics And Security, Pp 946-955 Vol. 4, No. 4, December 2009.
  8. Osamah S Badarneh and Michel Kadoch, (2009), "Multicast Routing Protocols in Mobile Ad Hoc Networks: A Comparative Survey and Taxonomy", EURASIP Journal on Wireless Communications and Networking PP 1-42, 2009.
  9. Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau (2006) "Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups" IEEE/ACM TRANSACTIONS ON Networking, Pp -263-277, Vol. 14, No. 2, April 2006.
  10. Wu, B. , Wu, J. and Dong, Y. (2008) "An ef?cient group key management scheme for mobile ad hoc networks", Int. J. Security and Networks, PP 1-10, 2008.
  11. Xuanwu Zhou, Ping Wei (2008) "Key Management Scheme Based on (t, n) Threshold Cryptosystem" Proceedings of 2008 3rd International Conference on Intelligent System and Knowledge PP 1288-1293, 2008.
  12. Yi-Ruei, Tygar and Wen-Guey (2011) "Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes" presented as part of the main technical program at IEEE INFOCOM, PP 1952 – 1960, 2011.
  13. Zhang Chuanrong and Liu Weijiang (2010) "New ID-Based Signcryption Scheme and Its Applications in Key Update Protocols of MANET" International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery PP 254-258, 2010.
  14. Zhang, J. Zheng, and M. Ma (2008), "A Survey of Key Management in Mobile Ad Hoc Networks" HANDBOOK OF RESEARCH ON WIRELESS SECURITY, Idea Group Inc. PP 1-23, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Pythagorean Tree Group Communication MANETs Group Key Generation Algorithm Energy Efficient Multicast Routing Protocol.