A reliable secure multicast key distribution scheme for mobile adhoc networks

被引:0
|
作者
SuganyaDevi, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] SNR SONS College (Autonomous), Coimbatore - 641006, Tamil Nadu, India
[2] Avinashilingam University for Women, Coimbatore-641043, Tamil Nadu, India
关键词
Mobile security - Mobile telecommunication systems - Network security - Military applications - Mobile ad hoc networks - Multicasting - Trees (mathematics) - Packet loss;
D O I
暂无
中图分类号
学科分类号
摘要
Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management is the fundamental challenge in achieving reliable secure communication using multicast key distribution for mobile adhoc networks. Thus in designing a reliable multicast key distribution scheme, reliability and congestion control over throughput are essential components. This paper proposes and evaluates the performance of an enhanced optimized multicast cluster tree algorithm with destination sequenced distance vector routing protocol to provide reliable multicast key distribution. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of key delivery ratio and packet loss rate under varying network conditions. This proposed scheme achieves reliability, while exhibiting low packet loss rate with high key delivery ratio compared with the existing scheme.
引用
收藏
页码:321 / 326
相关论文
共 50 条
  • [41] Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory
    Munivel, E.
    Lokesh, J.
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING CONTROL & AUTOMATION, VOLS 1 AND 2, 2008, : 124 - 129
  • [42] A Secure Key Distribution Protocol for Multicast Communication
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Subramanian, S. Siva
    CONTROL, COMPUTATION AND INFORMATION SYSTEMS, 2011, 140 : 249 - +
  • [43] A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
    Pour, Alireza Nemancy
    Kumekawa, Kazuya
    Kato, Toshihiko
    Itoh, Shuichi
    COMPUTER NETWORKS, 2007, 51 (17) : 4727 - 4743
  • [44] A new secure group key management scheme for multicast over wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    2006 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2006, : 23 - +
  • [45] Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory
    Munivel, E.
    Lokesh, J.
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 572 - +
  • [46] A Secure Online Key Establishment Scheme for Mobile Heterogeneous Sensor Networks
    Khan, Sarmad Ullah
    Pastrone, Claudio
    Lavagno, Luciano
    Spirito, Maurizio A.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [47] An Efficient Key Agreement Scheme for Dynamic Secure Multicast
    Chen Li-qing
    Yang Song
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 492 - 496
  • [48] An Improved Cluster Maintenance Scheme for Mobile AdHoc Networks
    Pathak, Sunil
    Dutta, Nitul
    Jain, Sonal
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2117 - 2121
  • [49] A secure hierarchical key management scheme in mobile ad hoc networks
    Shi, Rong-Hua
    Yuan, Qian
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (01): : 201 - 206
  • [50] A secure group key management scheme in mobile ad hoc networks
    Li, J
    Cui, GH
    Fu, XQ
    Liu, ZY
    Su, L
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1156 - 1159