A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 4
Abstract
The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET) is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK) based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.
Authors and Affiliations
Ayman EL-SAYED
Wireless Sensor Networks for Road Traffic Monitoring
Wireless Sensor Networks (WSNs) consist of large number of sensor nodes. Each node is empowered by a com-munication interface that is mainly characterized by low power, short transmission distance and minimal data rate s...
Analysis and Research of Communication Interrupt Fault for Shanghai Metro Data Transmission System
A line of Shanghai metro has been put into use for nearly fifteen years. There are three times extended during this time. The existing line’s data transmission system was modified over the last decades and has adopted ma...
Smart Home Energy Management System Design: A Realistic Autonomous V2H / H2V Hybrid Energy Storage System
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were pr...
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we shoul...
Student’s Opinions on Online Educational Games for Learning Programming Introductory
Use of educational games is an approach that has potential to change the existing educational method. This is due to games popularity among younger generation as well as engagement and fun features of games compared to c...