CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management

Published on November 2012 by Deepali Jain, Umang
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 2
November 2012
Authors: Deepali Jain, Umang
18b6de73-8f76-453c-a3b0-b61d63876936

Deepali Jain, Umang . Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 2 (November 2012), 4-8.

@article{
author = { Deepali Jain, Umang },
title = { Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 2 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 4-8 },
numpages = 5,
url = { /proceedings/ctngc/number2/9054-1014/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Deepali Jain
%A Umang
%T Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 2
%P 4-8
%D 2012
%I International Journal of Computer Applications
Abstract

A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. The nodes are free to move about and organize themselves into a network. For many application of MANET we need to establish secure group communication between members of groups. Some of the protocols to generate group key have been surveyed, and then their comparison is given based on the fact that if we divide the region into small region than the control overhead can be minimized. Numerical analysis is given to prove the result.

References
  1. Basagni, Conti, Giordano, Stojmenovic, "Mobile Ad Hoc Networking", IEEE Press, New Jersy, 2004.
  2. S. Rafaeli, D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys (CSUR) 35 (3) (2003) 309–329.
  3. M. Steiner, G. Tsudik, M. Waidner, Diffie–Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communications Security, January 1996, pp. 31–37.
  4. M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In I. B. Damgard, editor, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1994.
  5. R. K. Balachandran et al. , "CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad Hoc Networks," Proc. IEEE ICC '05, vol. 2, May 2005, pp. 1123–27.
  6. J. H. Cho, I. R. Chen, D. C. Wang, Performance optimization of region-based group key management in mobile ad-hoc networks, Performance Evaluation 65 (5) (2008) 319–344.
  7. T. Hardjono, B. Cain, I. Monga, Intra-domain group key management protocol, Internet Draft (1998).
  8. C. Zhang, B. DeCleene, J. Kurose, D. Towsley, Comparison of inter-area rekeying algorithms for secure wireless group communications, Performance Evaluation 49 (1–4) (2002) 1–20.
  9. S. Rafaeli, D. Hutchison, HYDRA: A decentralized group key management, in: Proc. 11th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 2002, pp. 62–67.
  10. L. Dondeti, S. Mukherjee, A. Samal, Scalable secure one-to-many group communication using dual encryption, Computer Communications 23 (17) (2000) 1681–1701.
  11. S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. ACM SIGCOMM'97, vol. 27, no. 4, Cannes France, September 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks Group Communication Group Key Management Hierarchical Group Key Management