Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
WMNs have been in recent times recommended as a capable low-cost approach to provide last-mile high-speed Internet access. A typical WMN is a multihop hierarchical wireless network. A major challenge in formulating such systems is to prevail over the difficulty of the potentially limited communication from the group to the sender. The unavailability of a completely trusted key generation centre and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges efficiently. This paper proposes and states a protocol for allocating and administrating secure group keys in ad hoc environments which applies for the Secure Optimized Link State Routing Protocol (SOLSR). Our protocol manages group keys taking into contemplation the frequent network partitions and the absence of infrastructure. The analysis shows that the protocol is energy efficient for high key replacement rates and frequent network partitions. We have using an Energy Efficient Group key management (EEGK) for secure data processing on network. A provably secure protocol in the new key management paradigm and execute widespread experiments in the context of mobile ad hoc networks.
Authors and Affiliations
K Haribabu, D Vijay
Security and Privacy in the Context of the Public Clouds
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...
Detecting Network And Application Layer Attacks in Networks
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...
Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and Throughput
EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the enc...
Securing SMS-based approach for two factor authentication
Nowadays most of the institution faces a huge problem related to security. Most of the institution uses the traditional way to provide authentication. That means most them are use passwords as an authentication mechan...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....