Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 2
Year of Publication: 2012
Authors:
Deepali Jain
Umang

Deepali Jain and Umang. Article: Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(2):4-8, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Deepali Jain and Umang},
	title = {Article: Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {2},
	pages = {4-8},
	month = {November},
	note = {Full text available}
}

Abstract

A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. The nodes are free to move about and organize themselves into a network. For many application of MANET we need to establish secure group communication between members of groups. Some of the protocols to generate group key have been surveyed, and then their comparison is given based on the fact that if we divide the region into small region than the control overhead can be minimized. Numerical analysis is given to prove the result.

References

  • Basagni, Conti, Giordano, Stojmenovic, "Mobile Ad Hoc Networking", IEEE Press, New Jersy, 2004.
  • S. Rafaeli, D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys (CSUR) 35 (3) (2003) 309–329.
  • M. Steiner, G. Tsudik, M. Waidner, Diffie–Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communications Security, January 1996, pp. 31–37.
  • M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In I. B. Damgard, editor, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, 1994.
  • R. K. Balachandran et al. , "CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad Hoc Networks," Proc. IEEE ICC '05, vol. 2, May 2005, pp. 1123–27.
  • J. H. Cho, I. R. Chen, D. C. Wang, Performance optimization of region-based group key management in mobile ad-hoc networks, Performance Evaluation 65 (5) (2008) 319–344.
  • T. Hardjono, B. Cain, I. Monga, Intra-domain group key management protocol, Internet Draft (1998).
  • C. Zhang, B. DeCleene, J. Kurose, D. Towsley, Comparison of inter-area rekeying algorithms for secure wireless group communications, Performance Evaluation 49 (1–4) (2002) 1–20.
  • S. Rafaeli, D. Hutchison, HYDRA: A decentralized group key management, in: Proc. 11th IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 2002, pp. 62–67.
  • L. Dondeti, S. Mukherjee, A. Samal, Scalable secure one-to-many group communication using dual encryption, Computer Communications 23 (17) (2000) 1681–1701.
  • S. Mittra, Iolus: A framework for scalable secure multicasting, in: Proc. ACM SIGCOMM'97, vol. 27, no. 4, Cannes France, September 1997.