Open Access
Subscription Access
A METHOD FOR OBTAINING SECURE AND EFFICIENT GROUP KEY OVER WIRELESS AD-HOC NETWORKS BASED ON A VIRTUAL SUBNET MODEL
Subscribe/Renew Journal
Today, mobile devices such as PDAs and notebooks etc are became most important in human life. A MANET is a mobile ad-hoc network which supports all types of communication such as unicast, multicast and “many-to-many” transmission. Until recently, efficient methods were not devised to generate group key for such groups. Generally, communication in wireless networks is, the risk of sensitive information being intercepted by unintended recipients is a real concern. So, MANETs require efficient and secure group communication. With the model, the groups are established as the forming of group keys. Our results show that this approach can completely satisfy the today’s needs of both security and efficiency for group communication.
Keywords
Diffie-Hellman Protocol, Secret Key Distribution, Virtual Subnet Model, Group Signature.
Subscription
Login to verify subscription
User
Font Size
Information
- E. Hossain and V.K. Bhargava, “Cognitive Wireless Communication Networks”, Springer Publisher, 2007.
- Hassan Bin Ahmad, “Enable Classifier based Spectrum Sensing in Cognitive Radio Networks”, Wireless Communications and Mobile Computing, Vol. 2019, pp. 1- 16, 2019.
- T.E. Bogale and L. Vandendorpe, “Max-Min SNR Signal Energy based Spectrum Sensing Algorithms for Cognitive Radio Networks with Noise Variance Uncertainty”, IEEE Transactions on Wireless Communications, Vol. 13, No. 1, pp. 280-290, 2014.
- T. Karthikeyan and K. Praghash, “An Improved Task Allocation Scheme in Serverless Computing using Gray Wolf Optimization (GWO) based Reinforcement Learning (RIL) Approach”, Wireless Personal Communications, Vol. 117, No. 3, pp. 1-19, 2020.
- X. Zhang, R. Chai and F. Gao, “Matched Filter Based Spectrum Sensing and Power Level Detection for Cognitive Radio Network”, Proceedings of IEEE Global Conference on Signal and Information Processing, pp. 1267-1270, 2014.
- S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
- I. Sobron, P.S.R. Diniz, W.A. Martins and M. Velez, “Energy Detection Technique for Adaptive Spectrum Sensing”, IEEE Transactions on Communications, Vol. 63, No. 3, pp. 617-622, 2015.
- T. Lathies Bhasker, “A Scope for MANET Routing and Security Threats”, ICTACT Journal on Communication Technology, Vol. 4, No. 4, pp. 840-848, 2013.
- H. Khattak and Nizamuddin, “A Hybrid Approach for Preventing Black and Gray-Hole Attacks in MANET”, Proceedings of International Conference on Digital Information Management, pp. 1-12, 2013.
- N.V. Kousik, “Analyses on Artificial Intelligence Framework to Detect Crime Pattern”, Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and Applications, pp. 119-132, 2021.
- A. Dorri and S. Reza, “A Fuzzy Congestion Controller to Detect and Balance Congestion in WSN”, International Journal of Wireless and Mobile Networks, Vol. 7, No. 1, pp. 137-145, 2015.
- A.S. Nandhini and P. Vivekanandan, “A Survey on Energy Efficient Routing Protocols for MANET”, International Journal of Advances in Engineering and Technology, Vol. 6, No. 1, pp. 370-381, 2013.
- R. Patan and A.H. Gandomi, “Improving Power and Resource Management in Heterogeneous Downlink OFDMA Networks”, Information, Vol. 11, No. 4, pp. 203- 216, 2020.
- Lalbihari Barik, “A Survey on Detecting Co-Operative Black Hole Attack on Multicast in Mobile Ad-Hoc Network”, International Journal of Current Engineering and Scientific Research, Vol. 5, No. 11, pp. 149-155, 2018.
- K.W. Kim, Y.H. Han and S.G. Min, “An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks”, Sensors, Vol. 17, No. 10, pp. 1-20, 2017.
- A. Daniel and P. Rajakumar, “A Survey on Various Load Balancing Algorithm to Improve the Task Scheduling in Cloud Computing Environment”, Journal of Advance Research in Dynamic Control Systems, Vol. 11, No. 8, pp. 2397-2406, 2019.
- K. Somasundaram and K. Sharma, “Nature-Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking”, Mathematical Problems in Engineering, Vol. 2021, pp. 1-21, 2021.
- P.K. Dhillon and S. Kalra, “Multi-Factor User Authentication Scheme for IoT-Based Healthcare Services”, Journal of Reliable Intelligent Environments, Vol. 4, No. 3, pp. 141-160, 2018.
- A.K. Das, P. Sharma, S. Chatterjee and J.K. Sing, “A Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks”, Journal of Network and Computer Applications, Vol. 35, No. 5, pp. 1646-1656, 2012.
- P. Johri, “Improved Energy Efficient Wireless Sensor Networks using Multicast Particle Swarm Optimization”, Proceedings of International Conference on Innovative Advancement in Engineering and Technology, pp. 1-6, 2020.
- S. Kannan and S.N. Mohanty, “Survey of Various Statistical Numerical and Machine Learning Ontological Models on Infectious Disease Ontology”, Proceedings of International Conference on Data Analytics in Bioinformatics: A Machine Learning Perspective, pp. 431-442, 2021.
- D.S.K. Tiruvakadu and V. Pallapa, “Confirmation of Wormhole Attack in MANETs using Honeypot”, Computers and Security, Vol. 76, No. 2, pp. 32-49, 2018.
- M. Mohanapriya and I. Krishnamurthi, “Modified DSR Protocol for Detection and Removal of Selective Black Hole Attack IN MANET”, Computers and Electrical Engineering, Vol. 40, No. 2, pp. 530-538, 2014.
Abstract Views: 404
PDF Views: 152