Secure Group Key Management using Ciphertext in MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted communication from the cluster/group nodes to the sender and unavailability of a trusted public/private key generation center. This paper proposes a technique that uses a combination of broadcast encryption technique and Cluster/Group key agreement to overcome the obstacles. Among the proposed techniques each member maintains one public/secret key pair, seeing that the remote sender broadcasts to the subgroup. Though the non-intended member conspire they will not extractinformation that boosts security of the message. The Cluster /Group size is independent of computation and communication overhead that decreases the delay. The proposed technique provides competent approach to add or delete members of a cluster and a flexible rekeying strategy. In case of conspiracy it provides security to the broadcasted data. Simulation results are given using NS2.
Authors and Affiliations
P Swetha , Dr. P. Premchand
Recognition of Human Iris Using Accurate Iris Map
Personal identification based on Biometrics technology is a trend in future. Iris Recognition is regarded as a high accuracy verification technology when compared to traditional approaches. In real-time Iris Rec...
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
Detection of Breast Cancer by the Identification of Circulating Tumor Cells Using Association Rule Mining
Abstract: Circulating Tumor Cells (CTCs) are cells that have shed into the vasculate from the primary tumor and circulate into the blood stream. In this proposed work, the major genes causing the breast cancer is identif...
An Indepth Understanding of eGovernance initiatives: eAuctionA Case Study Approach
Test Exude: Approach for Test Case Reduction
Abstract : Software development is a planned and structured process includes research, new development, modification, re-engineering results in software products. The structure of development of software is SDLC. I...