Abstract
Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper group key management schemes can be used to encrypt and decrypt the payload. This management is serious task in flexible network like MANET due to dynamic node movement and limited available resources. In order to get away from repeated group key refreshment for entire large network, rekeying done only for sub networks known as clusters. To cope up in this situation, the integrated approach of fuzzy trust based clustering (FTBC) and hierarchical distributed group key management is proposed in this paper. The FTBC isolate misbehaving node from legitimate data transmission and also categorize trusted and distrusted nodes by applying fuzzy logic rules. As well as there is no single solution adopted for all kind of applications, hence two more clustering schemes are proposed namely simple clustering and enhanced distributed weighted clustering are incorporated with key management to satisfy different needs. The performance of our proposal measured by introducing attackers and simulation results prove the proficiency of proposed schemes.
This is a preview of subscription content,
to check access.







References
Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.
Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.
Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.1109/HICSS.2002.994183.
Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364.
Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73.
Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.
Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41.
Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.
Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.
Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863.
Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.
Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.
Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69.
Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.
Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410.
El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94.
Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.1186/1687-1499-2014-161.
Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.
Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.
Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.15680/ijircce.2014.0212072.
K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6.
Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219.
Network Simulator NS2 available online: http://www.isi.edu/nsnam/ns.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gomathi, K., Parvathavarthini, B. & Saravanakumar, C. An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management. Wireless Pers Commun 94, 2149–2162 (2017). https://doi.org/10.1007/s11277-016-3366-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3366-x