Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the security key to decrypt the message. The receiver decrypts the transmitted message from sender using security key. The existing key management paradigms cannot covenant with these challenges resourcefully. This paper proposes and states a etiquette for allocating and administrating secure group keys in ad hoc environments which applies for the Secure Optimized Link State Routing Protocol (SOLSR). The code of behaviour deals with group keys taking into observation the frequent network partitions and the absence of infrastructure. We have using an Energy Efficient Group key management (EEGK) for secure data processing on network. A provably secure protocol in the new key management hypothesis and execute widespread experiments in the circumstance of mobile ad hoc networks. The analysis shows that the protocol is energy proficient for high key replacement rates and frequent network partitions.
Authors and Affiliations
A. Bala Koteswari, N. V. Satya Pradeep. Kotla
Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds
The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper w...
Incorporating Human Behavioral Patterns in Big Data Text Analytics
One of the modern day emerging technologies include Big Data Analysis. Big Data refers to the huge terabytes of data being collected on internet web sites such as Facebook, Twitter etc, Machine data such as sensors an...
Automatic Wrapper Generation for Search Engines Based on Visual Representation
Normally web databases are provides the information based on query representation. All the results are displayed without any structure. All extracted results are not provides any specific or perfect generation. It ca...
Transportation XSS Model Data Escape Finding In Content Delivery Networks
Recently increasing use of multimedia scheme applications and services the applications is trusted video sources to dentations undesirable content-loss become critical. While preserving user security XSS model is use...
Data Protection and Malicious Insiders Detection in Cloud
Cloud computing presents a huge data services to the user in an easy and comfortable way over the existing network. The main feature of the cloud service is that the data shared by the users are processed remotely wit...