An Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS
نویسندگان
چکیده
It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive closure graph. We also performed collaborative group key generation with the nodes defined in the transitive closure graph to accomplish secure communication among the group members. Due to the dynamic nature of nodes in the group, we propose the join and leave algorithm. The rekeying is performed at every change that happens in the (Transitive Closure Graph) TCG. The performance analysis is done by simulation with various protocols with respect to the time taken to joining or leaving the group, time taken for group key generation, rekeying the nodes with respect to renewal of nodes in the group. The proposed system shows our protocol reduces the computational and communicational cost of secure group communication.
منابع مشابه
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
Secure group communication is a challenging task with respect to MANET’s, authentication of mobile nodes, group key establishment and rekeying for secure information exchange and QoS in data transfer. In this paper we authenticate the mobile nodes through transitive signature scheme in the routing phase of AODV protocol. For a secure group communication we establish a collaborative group key wi...
متن کاملEETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs
A secure group communication in Mobile Ad-Hock Networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper we proposed an energy efficient multicast routing protocol to establish the group in MANETS. In order to preserve security...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملA New Provably Secure Transitive Signature Scheme
A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability. Composability means that by knowing signatures on t...
متن کامل