Secure Group Key Management using Ciphertext in MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted communication from the cluster/group nodes to the sender and unavailability of a trusted public/private key generation center. This paper proposes a technique that uses a combination of broadcast encryption technique and Cluster/Group key agreement to overcome the obstacles. Among the proposed techniques each member maintains one public/secret key pair, seeing that the remote sender broadcasts to the subgroup. Though the non-intended member conspire they will not extractinformation that boosts security of the message. The Cluster /Group size is independent of computation and communication overhead that decreases the delay. The proposed technique provides competent approach to add or delete members of a cluster and a flexible rekeying strategy. In case of conspiracy it provides security to the broadcasted data. Simulation results are given using NS2.
Authors and Affiliations
P Swetha , Dr. P. Premchand
Documentaries use for the design of learning activities
Documentaries used in the training field constitute the rich sources of information. They have the advantage to associate the elements of knowledge with events which request the episodic memory of the learn...
An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network
Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....
A Review on Content Based Medical Image Retrieval for Different Imaging Modalities, Organs and Diseases
This paper presents a review on Content based medical image retrieval for medical imaging modalities. Theevolution in the field of medical imaging system has lead industries to intellectualize a complete automated system...
I-ViDE: An Improved Vision-Based Approach for Deep Web Data Extraction
Abstract: Deep Web contents are accessed by queries submitted to Web databases and the returned data records are enwrapped in dynamically generated Web pages (they will be called deep Web pages in this paper). Extr...