Intra and Inter Group Key Authentication for Secure Group Communication in MANET

  • G. NarayanaEmail author
  • M. Akkalakshmi
  • A. Damodaram
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 8)


Mobile Ad Hoc Network (MANET) is basically an infrastructure less network consisting of numerous member nodes connected to each other wirelessly. All the nodes in MANET work in cooperation with one another, by forwarding the data to its neighbor node which is within its transmission range, and the neighbor node, in turn forwards it, until the data reaches its respective destination. But, if there exists any malicious node in the network, then the data being transmitted gets damaged/compromised. This is possible since all nodes are linked wirelessly, which makes it easy for the attackers/malicious nodes to infiltrate the network. So to protect the network data, we propose a intra and inter group key authentication technique for secure group communication. In this technique, the network is divided into several groups. Each group has a intra group key to safeguard its privacy. When two nodes belonging to different group want to communicate with each other, then they generate a inter group key and then securely carry out communication.


Secure group communication Key authentication Key encryption key Security 


  1. 1.
    Maria Striki, John S. Baras and Kyriakos Manousakis, “A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET”, IEEE, International Conference on Communication, PP: 2249–2255, 2006.Google Scholar
  2. 2.
    Xixiang Lv and Hui Li, “Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks”, IET Information Security, ISSN:1751-8709, 2010.Google Scholar
  3. 3.
    Mohamed Younis, Osama Farrag and Bryan Althouse, “TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks”, IEEE Transactions on Network and Service Management, Vol. 9, No. 1, MARCH 2012.Google Scholar
  4. 4.
    Zhiguo Wan, Kui Ren, and Ming Gu, “USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks”, IEEE Transactions on Wireless Communications, 2012.Google Scholar
  5. 5.
    Hua-Yi Lin and Tzu-Chiang Chiang, “Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks”, EURASIP Journal on Wireless Communications and Networking, PP: 1–15, 2011.Google Scholar
  6. 6.
    Weichao Wang and Yu Wang, “Secure Group-based Information Sharing in Mobile Ad Hoc Networks”, IEEE International Conference on Communications, PP: 1695–1699, 2008.Google Scholar
  7. 7.
    Sukin Kang, Cheongmin Ji, and Manpyo Hong, “Secure Collaborative Key Management for Dynamic Groups in Mobile Networks”, Journal of Applied Mathematics, Volume 2014, Article ID 601625, 10 pages.Google Scholar
  8. 8.
    Yanji Piaoa, Jong Uk Kima, Usman Tariqb, Manpyo Hong, “Polynomial-based key management for secure intra-group and inter-group communication,” Journal of Computers & Mathematics with Applications, Vol. 65, 2013.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of CSEJNTUHHyderabadIndia
  2. 2.Department of ITGITAMS UniversityHyderabadIndia
  3. 3.Sri Venkateswara UniversityTirupatiIndia

Personalised recommendations