Enhanced TKTOFT protocol for ternary tree based distributed group key management in cognitive radio networks

被引:0
|
作者
Mala, C. [1 ]
Renugadevi, N. [1 ]
Chen, Hsing-Chung [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] Asia Univ, Comp Sci & Informat Engn, Taichung, Taiwan
来源
关键词
Cognitive radio networks; Group key management; Key tree; Batch rekeying; Pruned nodes; Renewed nodes; SECURE MULTICAST; AGREEMENT; SCHEME;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cognitive radio networks provide solution to inefficient utilization of spectrum resources present in current wireless communication networks. Group key management techniques are used to secure communication among nodes in cognitive radio networks. This paper analyses total number of nodes that are pruned and renewed in ternary key tree during batch rekeying to measure the communication overhead. With this analysis, this paper proposes and implements an enhanced version of TKTOFT protocol (ETKTOFT) with modified batch rekeying scheme. From the simulation results, it is inferred that the proposed ETKTOFT protocol computationally outperforms SKM method and TKTOFT protocol by reducing the rekeying time to 57.16% and 15.14% respectively. Further, the proposed protocol generates 18% lesser number of renewed nodes than existing TKTOFT protocol thus reducing the communication overhead. As the proposed protocol minimizes both computation and communication overhead, it in turn can reduce the energy consumed by wireless mobile devices used in group oriented applications, thus increasing their lifetime.
引用
收藏
页码:103 / 116
页数:14
相关论文
共 50 条
  • [1] Ternary tree based group key management in dynamic peer networks
    Wang, Wei
    Ma, Jianfeng
    Moon, SangJae
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1265 - 1268
  • [2] Ternary tree based group key management in dynamic peer networks
    Wang, Wei
    Ma, Jianfeng
    Moon, SangJae
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 513 - +
  • [3] Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks
    Renugadevi, N.
    Mala, C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4289 - 4307
  • [4] Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
    Renugadevi, N.
    Mala, C.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2015, 9357 : 161 - 172
  • [5] Tree Based Protocol for Key Management in Wireless Sensor Networks
    M. -L. Messai
    M. Aliouat
    H. Seba
    [J]. EURASIP Journal on Wireless Communications and Networking, 2010
  • [6] Tree Based Protocol for Key Management in Wireless Sensor Networks
    Messai, M. -L.
    Aliouat, M.
    Seba, H.
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [7] Scalable group key management protocol based on key material transmitting tree
    Zheng, Minghui
    Cui, Guohua
    Yang, Muxiang
    Li, Jun
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 301 - +
  • [8] Contention Based Multichannel MAC Protocol for Distributed Cognitive Radio Networks
    Debroy, Saptarshi
    De, Swades
    Chatterjee, Mainak
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2749 - 2762
  • [9] Lightweight Key Management in Distributed Multi-Channel Cognitive Radio Networks
    Kasiri, Behzad
    Cai, Jun
    Alfa, Attahiru S.
    [J]. 2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [10] A Distributed Minimum Spanning Tree for Cognitive Radio Networks
    Murmu, Mahendra Kumar
    Firoz, Akheel M.
    Meena, Sandeep
    Jain, Shubham
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 162 - 169