Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network

نویسنده

  • Adnan Shahid Khan
چکیده

In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. However, in RMRA, the rekeying is carried out after a specific interval of time, which cannot ensure the security for multicast communication on joining the member. Secondly, the rekeying scheme generates a huge communication overhead on the serving multihop relay base station (MR-BS) on frequent joining of members. Lastly, there is nothing about when a member left the group communication. Thus, the rekeying scheme of RMRA fails to provide forward and backward secrecy and also is not scalable. To solve this problem, an improved rekeying scheme based on broadcasting a new seed value on joining and leaving of a member for updating the ongoing key management is proposed. The proposed scheme solves the issue of forward and backward secrecy and the scalability in a very simplified way. The forward and backward secrecy of the proposed scheme has been extensively validated by formal method using rank theorem. Furthermore, mathematical derivation showed that the proposed scheme out-performed the RMRA in terms of communication cost and complexity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy-Efficient Distributed Target Tracking using Wireless Relay Robots

This paper considers the problem of mobile target tracking, in which a pursuer robot has to capture a mobile target with the aid of multiple wireless relay robots. We assume that the relay robots are able to self-organize to form an ad hoc robotic network when a tracking event is triggered, and act as static multihop relays to disseminate the latest target trajectory they detect to the pursuer....

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Network

Relaying and cooperation have re-emerged as important research topic in the wireless communication over the past decade. IEEE 802.16j Multihop relay network is assiduously developing to accomplish high capacity services with large cell coverage. Considerable interest currently exists in the exploitation of Relay based Wimax. This is mainly the result of lower infrastructure cost and high data t...

متن کامل

A Method for Network Assisted Relay selection in Device to Device Communication for The 5 G

Device to device communication is the interest of fifth generation where the User Equipments (UEs) are capable to directly communicate with other device with partial involvement of base station (BS). However, devices that are not in proximity area, communicate with other devices (relay). This relay selection is done by Base Station (Network Assisted). Network assisted Multihop device to device ...

متن کامل

Selection of Energy Efficient and Stable Routes over Multihop and Multiflow Mobile Ad Hoc Cognitive Network

Data communication is severely affected in the mobile adhoc cognitive networks (MACNets) due to link instability and channel interference. The availability and stability of each link in MACNets highly depends on not only the relative movement of neighbor nodes but also the adjacent communication among primary nodes and among cognitive nodes. So, in the existing system a cross-layer distributed ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCNIS

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2014