Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
WMNs have been in recent times recommended as a capable low-cost approach to provide last-mile high-speed Internet access. A typical WMN is a multihop hierarchical wireless network. A major challenge in formulating such systems is to prevail over the difficulty of the potentially limited communication from the group to the sender. The unavailability of a completely trusted key generation centre and the dynamics of the sender. The existing key management paradigms cannot deal with these challenges efficiently. This paper proposes and states a protocol for allocating and administrating secure group keys in ad hoc environments which applies for the Secure Optimized Link State Routing Protocol (SOLSR). Our protocol manages group keys taking into contemplation the frequent network partitions and the absence of infrastructure. The analysis shows that the protocol is energy efficient for high key replacement rates and frequent network partitions. We have using an Energy Efficient Group key management (EEGK) for secure data processing on network. A provably secure protocol in the new key management paradigm and execute widespread experiments in the context of mobile ad hoc networks.
Authors and Affiliations
K Haribabu, D Vijay
Logo Matching And Recognition System Using Surf
Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...
Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes
The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing endto-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged...
Big Data Analytics for Net Flow Analysis in Distributed Environment using Hadoop
Network traffic measurement and analysis have been regularly performed on a high performance server that collects and analysis packet flow. When we monitor a large volume of network traffic data for detailed statisti...
Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends an...
Mobility Prediction: A review of Techniques used in MANETS
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...