Advertisement

A Secure and Computational-Efficient Multicast Key Distribution for Wireless Networks

  • B. Srinivasa Rao
  • P. Premchand
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 768)

Abstract

In the present research work a simulation mechanism has been designed and implemented for a secure, computation efficient and dynamic multicast key distribution system that can be applicable to wireless networks. The present model uses the concept of Maximum Distance Separable (MDS) codes to enhance the computation efficiency of the multicast key distribution system. Also an attempt has been made to improve the security of the multicast key distribution system against the previous multicast group members that had turned into adversaries. By encrypting the newly generated keys with the older one may provide improved security to the system. The DES algorithm has been used for encryption of the new session keys. The implemented results have presented and discussed.

Keywords

Multicast key distribution Security Session keys Computational efficiency Wireless network Key security Dynamical distribution 

Notes

Acknowledgements

B. Srinivasa Rao is very much thankful to Dr. L. Pratap Reddy, Professor, Department of ECE, JNTUH, Hyderabad, for his valuable suggestions. The author is also thankful to the Management of GRIET for their encouragement and cooperation for pursuing his Ph.D. work.

References

  1. 1.
    Datta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self healing key distribution with revocation in wireless ad hoc networks. Ad hoc Netw. 8(6), 597–613 (2010). http://doi.org/10.1016/j.adhc.2009.11.005
  2. 2.
    Suganyadevi, D., Padmavathi, G.: Energy efficient CBMT for secure multicast key distribution in mobile and adhoc networks. Procedia Comput. Sci. 2, 248–255 (2010)CrossRefGoogle Scholar
  3. 3.
    Zhou, J., Ou, Y.: Key tree and Chinese reminder theorem based group key distribution scheme. In: Hun, A., Chang, S.L. (eds.): Algorithms and Architectures for Parallel Processing, ICA3PP2009(LNCS), pp. 254–265 (2009)Google Scholar
  4. 4.
    Planisamy, V., Annadurai, P.: Secure group communication using multicast key distribution scheme in adhoc networks. IJCA 1(25), 86–91 (2010) (www.ijcaonline.com)
  5. 5.
    Vijaykumar, P., Bose, S., Kannan., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. KSII Trans. Internet Inf. syst. 7, 878–894 (2013).  https://doi.org/10.3837/tiis.2013.04.016
  6. 6.
    Manjul, M., Mishra, R.: Secure group communication based on elliptic curve cryptography. Trans. Netw. Commun. 2(1) (2014).  https://doi.org/10.14738/tnc.21.7
  7. 7.
    Vijay, A., Kumar, D.S.: Elliptic curve for secure group key management in distributed networks. IJCER 6(6), 21–28 (2016) (www.ijceronline.com)
  8. 8.
    Hanatani, Y., Ogura, N., Ohba, Y., Chen, L., Das, S.: Secure multicast group management and key distribution in IEEE 802.21. In: Chen, L., et al. (eds.): Security Standardisation Research, SSR2016, LNCS10074, pp. 227–243 (2016).  https://doi.org/10.1007/978-3-319-49100-4_10
  9. 9.
    Yadav, A.K., Soni, S.: Secure multicast key distribution in mobile and adhoc networks. Adv. Wirel. Commun. 10(4), 781–782 (2017) (www.ripublication.com)
  10. 10.
    Zhu, H.: An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries. Sci. China Inf. Sci. 60, 52109 (2017).  https://doi.org/10.1007/s11432-014-0911-8
  11. 11.
    Xu, L., Huang, C.: Computing efficient multicast key distribution. IEEE Trans. Parallel Distrib. Syst. 19(5), 577–586 (2008)CrossRefGoogle Scholar
  12. 12.
    Sivani, Y.V., Sudha, T.: A novel approach for secured symmetric key distribution in dynamic multicast network. IJERA 1(4), 1441–1447 (2011) (www.ijera.com)
  13. 13.
    Rani, D., Babu, K.G.P.: Computationally efficient group keying for time sensitive applications. IJCER 2, 589–595 (2012) (www.ijceronline.com)
  14. 14.
    Madhusudhan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile and adhoc networks. Sci. World J. 2015 (2015) (Article id: 801632). https://dx.doi.org/10.1155/2015/801632
  15. 15.
    Amara, S.O., Beghdad, R., Oussalah, M.: Securing wireless sensor networks: a survey. J. EDPACS 47(2), 6–29 (2013)CrossRefGoogle Scholar
  16. 16.
    Seetha, R., Saravanan, R.: A survey on group key management schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015).  https://doi.org/10.1515/cait-2015-0038
  17. 17.
    El-Bashary, M., Abdelhafez, A., Anis, W.: A comparative study of group key management in MANET. IJERA 5(8), 85–94 (2015) (www.ijera.com)
  18. 18.
    Fu, K., Kamara, S., Kohno, T.: Key regression: enabling efficient key distribution for secure distributed storage. In: Proceedings of the NDSS’06 (2006) (www.microsoft.com)

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGokaraju Rangaraju Institute of Engineering and Technology (Affiliated to Jawaharlal Nehru Technological University Hyderabad)Bachupally, HyderabadIndia
  2. 2.Department of Computer Science Engineering, University College of EngineeringOsmania UniversityHyderabadIndia

Personalised recommendations