Full Paper View Go Back
Group Rekeying Management Scheme for Mobile Ad-hoc Network
Pradeep Sharma1 , Shivlal Mewada2 , Aruna Bilavariya3
Section:Research Paper, Product Type: Journal
Vol.1 ,
Issue.5 , pp.5-12, Nov-2013
Online published on Oct 30, 2013
Copyright © Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya, “Group Rekeying Management Scheme for Mobile Ad-hoc Network,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.5-12, 2013.
MLA Style Citation: Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya "Group Rekeying Management Scheme for Mobile Ad-hoc Network." International Journal of Scientific Research in Network Security and Communication 1.5 (2013): 5-12.
APA Style Citation: Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya, (2013). Group Rekeying Management Scheme for Mobile Ad-hoc Network. International Journal of Scientific Research in Network Security and Communication, 1(5), 5-12.
BibTex Style Citation:
@article{Sharma_2013,
author = {Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya},
title = {Group Rekeying Management Scheme for Mobile Ad-hoc Network},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {11 2013},
volume = {1},
Issue = {5},
month = {11},
year = {2013},
issn = {2347-2693},
pages = {5-12},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=107},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=107
TI - Group Rekeying Management Scheme for Mobile Ad-hoc Network
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Pradeep Sharma, Shivlal Mewada , Aruna Bilavariya
PY - 2013
DA - 2013/10/30
PB - IJCSE, Indore, INDIA
SP - 5-12
IS - 5
VL - 1
SN - 2347-2693
ER -
Abstract :
Ensuring security in Mobile Ad-hoc Network is a challenging issue Many emerging applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad hoc network a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in network. Where there may be one or more malicious nodes in between source and destination. Establishing MANET security is entirely different from the traditional methods of providing network security. As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention Securing communications in resource constrained, infrastructure-less environments such as MANETs is very challenging. All cryptographic techniques will be not effective if the key management is weak. The purpose of rekeying management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. In MANETs, A number of key management schemes have been proposed for MANETs. In this paper, we proposea Centralize approach based rekeying management scheme with group management.
Key-Words / Index Term :
MANET, Key Management, Centralized approach, Cryptography, Private Key, Rekeying System, Group Management
References :
[1]. T. Chiang and Y. Huang. “Group keys and the multicast security in ad hoc networks”. In Proceedings of the 2003 International Conference on Parallel Processing Workshops, 2003.
[2]. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. “Secure multicast groups on ad hoc networks”. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pages 94–102. ACM Press, 2003.
[3]. D.Huang, D.Medhi, “A Secure Group Key Management scheme for Hierarchical Mobile Adhoc Networks”, Adhoc Networks, June 2008.
[4]. Umesh Kumar Singh, ShivlalMewada, Lokesh Laddhani & Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security (IJCSIS) USA, Volume-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500
[5]. N. Kettaf, H. Abouaissa, P. Lorenz, “An Efficient Heterogeneous Key Management approach For Secure Multicast Communication in Ad hoc networks”, Springer, Telecommunication System, vol-37, pp: 29-36 , February 2008
[6]. Thair Khdour and Abdullah Aref, “A HYBRID SCHEMA ZONE-BASED KEY MANAGEMENTFOR MANETS”, Journal of Theoretical and Applied Information Technology, Vol. 35 No.2, 31 January 2012.
[7]. G. Chockler, I. Keidar, and R. Vitenberg. “Group communication speci_cations: A comprehensive study”. ACM Computing Surveys, 33(4), December 2001.
[8]. D. Powell. Group communication. CACM, 39(4), 1996.
[9]. C. Basile, M.-O. Killijian, and D. Powell. “A survey of dependability issues in mobile wireless networks”. Technical report, LAAS CNRS, France, February 2003.
[10]. http://citeseer.nj.nec.com/400961.html.2000.H. Dang, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks”, IEEE Communications Magazine, 0163-6804, pp. 70-75, October 2009.
[11]. Kamal Kumar Chauhan and Amit Kumar Singh Sanger, “Securing Mobile Ad hoc Networks: Key Management and Routing”, International Journal on Ad Hoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012.
[12]. Merin Francis, M. Sangeetha and Dr. A. Sabari, “A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 3, Issue 1, January 2013.
[13]. Mohamed Salah Bouassida, Isabelle Chrisment, and Olivier Festor, “Group Key Management in MANETs”, International Journal of Network Security, Vol.6, No.1, PP.67–79, Jan. 2008.
[14]. S.Rajarajeswari and S.BaghavathiPriya, “An Optimal key Management for MANET”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1 February 2013.
[15]. Aldar C-F. Chan, Edward S. Rogers, “Distributed Symmetric Key Management for Mobile Ad hoc Networks”, IEEE INFOCOM ,vol.6,issue 1, feruary 2004.
[16]. Manel Guerrero Zapata, “Key management and delayed verification for Ad hoc networks”, Journal of High Speed Networks 15 (2006) 93–109
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.