Full Paper View Go Back

An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups

M. Sandhya Rani1 , R. Rekha2 , K.V.N Sunitha3

Section:Research Paper, Product Type: Journal
Vol.9 , Issue.2 , pp.1-4, Apr-2021

Online published on Apr 30, 2021


Copyright © M. Sandhya Rani, R. Rekha, K.V.N Sunitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Sandhya Rani, R. Rekha, K.V.N Sunitha, “An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups,” International Journal of Scientific Research in Network Security and Communication, Vol.9, Issue.2, pp.1-4, 2021.

MLA Style Citation: M. Sandhya Rani, R. Rekha, K.V.N Sunitha "An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups." International Journal of Scientific Research in Network Security and Communication 9.2 (2021): 1-4.

APA Style Citation: M. Sandhya Rani, R. Rekha, K.V.N Sunitha, (2021). An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups. International Journal of Scientific Research in Network Security and Communication, 9(2), 1-4.

BibTex Style Citation:
@article{Rani_2021,
author = {M. Sandhya Rani, R. Rekha, K.V.N Sunitha},
title = {An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2021},
volume = {9},
Issue = {2},
month = {4},
year = {2021},
issn = {2347-2693},
pages = {1-4},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=408},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=408
TI - An efficient and secure ID based Asymmetric Key Management Scheme for Dynamic Groups
T2 - International Journal of Scientific Research in Network Security and Communication
AU - M. Sandhya Rani, R. Rekha, K.V.N Sunitha
PY - 2021
DA - 2021/04/30
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 2
VL - 9
SN - 2347-2693
ER -

859 Views    308 Downloads    204 Downloads
  
  

Abstract :
A Group Key Agreement (GKA) protocol in Mobile Adhoc Networks (MANETS)permits a group of users to share a common secret using wireless links. Due to the advancement of technology, GKA poses a major challenge to provide authentication & confidentiality in open networks. This paper provides the diversified details of distributed group key management protocols from centralized group key management protocols and traditional symmetric group key agreement from asymmetric group key agreement protocols. In asymmetric group key management protocols, only a group encryption key is negotiated, and decryption key is kept secret at each user. In our proposed ID-based Asymmetric distributed group key agreement protocol, Chinese Remainder Theorem is used for computing Group Encryption Key and RSA algorithm is used for generating public and private keys for each member. The main advantage of our protocol is that it decreases the computation overhead of the members with respect to group dynamics and provides secure multicast communication in MANETs in comparison with other existing schemes.

Key-Words / Index Term :
Group Key, Computation, Communication, Key Management

References :
[1] Bouassida MS, Chrisment I, Festor O “A group key management in MANETs”, International Journal of Network Security, Vol.6, pp.67-79, 2008.
[2] Boneh, D. and Silverberg, A, “Applications of Multilinear Forms to Crytography”, Contemporary Mathematics , Vol.324, pp.71-90, 2003.
[3] Burmester M, Desmedt Y, “A secure and efficient conference key distribution system”, Advances in Cryptology — EUROCRYPT`94., Springer Berlin Heidelberg , pp.275-286, 1995.
[4] Choi K Y, Hwang J Y, Lee D H., “Efficient ID-based group key agreement with bilinear maps”, Public Key Cryptography–PKC 2004. Springer Berlin Heidelberg, pp.130-144, 2004.
[5] Du X J, Wang Y, Ge J H, et al. “ID-based authenticated two round multiparty key agreement”, Iacr Cryptology Eprint Archive, 2003.
[6] Zhang F, Chen X. Attack on Two ID-based Authenticated Group Key Agreement Schemes”, Iacr Cryptology Eprint Archive, 2003.
[7] Zheng S, Wang S, Zhang G, “A dynamic, secure, and efficient group key agreement protocol”, Frontiers of Electrical & Electronic Engineering in China, pp.182-185, 2007.
[8] Zhang Q, Wang R, Tan Y. “Identity-Based Authenticated Asymmetric Group Key Agreement”, Journal of Computer Research & Development, 2014.
[9] Shi Y, Chen G, Li J. “ID-based one round authenticated group key agreement protocol with bilinear pairings”, Information Technology: Coding and Computing-ITCC 2005,International Conference on. IEEE, 2005, pp.757-761, 2005.
[10] Zhong Yan-tao, Ma Jian-feng.,“ Identity based group key management scheme for LEO / MEO double-Layer space information network”, Journal of Astronautics, Vol.32, pp.1551-1556, 2011.
[11] Yao G, Wang H, Jiang Q. “An Authenticated 3-Round Identity-Based Group Key Agreement Protocol”, Availability, Reliability and Security-ARES 08. Third International Conference on. IEEE, pp:538-543,2008.
[12] Huang Y, Jianzhu L U., “A New Identity-based Authenticated Encryption Scheme”, Computer Engineering,, Vol.33, pp.149-152, 2007.
[13] Sandhya Rani M, Rekha R, Sunitha KVN., “Multicast Symmetric Secret Key Management Scheme in Mobile Adhoc Networks”, ICETE-2020 Springer Conference.:.DOI: 10.1007/978-3-030-24322-7_24, pp: 182-189,2020
[14] Sandhya Rani M, Rekha R, Sunitha KVN., “ID Based Multicast Secret-Key Management Scheme(SKMS) in MANETS”, International Journal of Intelligent Engineering &Systems(IJIES) Vol.11,No.6,pp:199-208,2018

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation