Simulation of A Novel Scalable Group Key Management Protocol for Mobile Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2016, Vol 8, Issue 3
Abstract
A Mobile Adhoc Network (MANET) is a collection of autonomous nodes that communicate with each other ,most frequently using a multi-hop wireless network. Secure and multicast group communication is an active area of research in MANETS. The main problem in secure group communication is group dynamics and key management. Group key management is crucial for multicast security. Member joining and member leaving from the group is the main challenge in designing secure and scalable group communication for dynamic update of keys. Most of the proposed solutions for wired networks are not considering this parameter and so suffer from the one-affects-n scalability problem. This paper presents the simulation of A Novel Scalable Group Key Management Protocol (NSGKMP) for wireless Adhoc Networks and demonstrates the simulation results through NAM(Network Animator) in NetworkSimulator2 (NS2). This NSGKMP for MANETs approach decreases number of rekeying operations when a member joins in to the group or leaves from the group i.e. dynamic updating of keys.
Authors and Affiliations
M. Sandhya Rani , Dr. R. Rekha , Dr. K. V. N Sunitha
Real-time Image Scene Classification and Segmentation System
An original approach is proposed. Called the Pre-Segmented Region of Interest Classification Scene System (PSROI), this system is able both to classify a scene during a digital camera's pre-capture phase, and to determin...
Design and Implementation of a Three Dimensional CNC Machine
This paper discusses the design and implementation of low cost three dimensional computerized numerical control (CNC) machines for Industrial application. The primary function of this microcontroller based CNC machine is...
Ultrasonic Sensor Based 3D Mapping & Localization
This article provides a basic level introduction to 3D mapping using sonar sensors and localization. It describes the methods used to construct a low-cost autonomous robot along with the hardware and software used as wel...
A Survey on Cloud Computing Security, Challenges and Threats
Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like n...
A New Approach for Designing Cryptographic Systems based on Feistel Structure
Many Classical and modern cryptographic algorithms have been developed by the Cryptographers to facilitate data security operations. Classical ciphers are not being widely used because of limited key space. Public key cr...