Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
WMNs have been in recent times recommended as a capable low-cost approach to provide last-mile high-speed Internet access. A typical WMN is a multihop hierarchical wireless network. A major challenge in formulating such systems is to prevail over the difficulty of the potentially limited communication from the group to the sender. The unavailability of a completely trusted key generation centre and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges efficiently. This paper proposes and states a protocol for allocating and administrating secure group keys in ad hoc environments which applies for the Secure Optimized Link State Routing Protocol (SOLSR). Our protocol manages group keys taking into contemplation the frequent network partitions and the absence of infrastructure. The analysis shows that the protocol is energy efficient for high key replacement rates and frequent network partitions. We have using an Energy Efficient Group key management (EEGK) for secure data processing on network. A provably secure protocol in the new key management paradigm and execute widespread experiments in the context of mobile ad hoc networks.
Authors and Affiliations
K Haribabu, D Vijay
Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks
A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficient...
A New Approach For Automate Test case Generation Covering Branches In Software Testing
Testing is the process of evaluating a system or its components intended to find that whether it satisfies the specified requirements or not. Testing is executing a system in order to identify any gaps, errors or mis...
Secure and Privacy Approach in Mobile-Healthcare emergency Using PPSPC technique
In this paper, we proposing a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be op...
Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...