Performance Characteristics of Cluster-Based Group Key Management in Mobile Ad Hoc Ne
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP

Posts: 2,492
Joined: Mar 2010
22-04-2010, 12:01 AM

We propose and analyze a scalable and efficient cluster-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic reconfigurability; we take a cluster-based approach by which group members are broken in to cluster-based subgroups and leaders in subgroups securely communicate with each other to agree on a group key in response to membership change and member mobility events. We show that secrecy requirement for group communication is satisfied. Further, there exists an optimal cluster size that minimizes the total network communication cost as a result of efficiently trading inter-regional vs. intra-regional group key management overheads. We give an analytical expression of the cost involved which allows the optimal cluster size to be identified, when given a set of parameter values characterizing a group communicating system in mobile ad hoc networks.

Many mobile wireless applications nowadays are based on secure group communication by which data is encrypted using an encryption key (called a group key). When a member joins a group, the group key is re keyed so that the new member cannot decrypt the previous messages. This is meant by Backward Secrecy. When a member leaves a group, the group key is re keyed so that the leaving member could not decrypt the messages in future. This is meant by Forward Secrecy.In this paper we propose a reliable and secure cluster-based group key management protocol for secure group communication in mobile ad “hoc networks (MANET). We also propose a Contributory Key Agreement protocol (CKA) for key generation instead of a centralized key server. We break a group in to cluster-based subgroups with a leader in each group. Any changes in these groups will be recorded as a membership change event and other event changes. Each group has a group key and each leader in a group has a leader key, there is also cluster key to identify the clusters. Each of these keys contains information about Id™s of a cluster, group or member.

Conceivably, as the number of group members becomes large, group key management can incur significant overheads and cause a potential system performance bottleneck. For scalability and dynamic management, we propose a two level hierarchical key management architecture adopted from the IETF Group Key Management Architecture to efficiently and securely distribute keys. In our protocol, a leader communicates with the members in the same region using a cluster key. All leaders in the group use a leader key, KLR, for communications among leaders. A group key, KG, is derived from the leader key KG =MAC (KLR, c), where KLR is a leader key and c is a counter to be incremented whenever a group membership change event occurs. The group key (KG) is used for Secure data communications among group members. These three keys are re keyed for secure group communications depending on events that occur in the system.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: cluster based group key project for wireless ad hoc networks, seminar on group key management, large group key, distributed group key management system in cluster based communication projects,
Popular Searches: high performance cluster computing, characteristics of wein bridge in psice, group disscution on use of mobile phone internet in india, this cluster of computers shares common network characteristics like the same namespace, heterogeneity characteristics, performance management seminar topics, characteristics,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ONLINE EL-CHICO RESTAURANT MANAGEMENT SYSTEM seminar flower 1 594 08-04-2016, 11:10 AM
Last Post: mkaasees
  PROJECT ON HOSPITAL MANAGEMENT SYSTEM seminar flower 1 900 01-04-2016, 11:54 AM
Last Post: mkaasees
  ABSTRACT ON REPORT HOSPITAL MANAGEMENT SYSTEM study tips 1 553 01-04-2016, 11:53 AM
Last Post: mkaasees
  intel centrino mobile technology ppt jaseelati 0 256 05-01-2015, 04:49 PM
Last Post: jaseelati
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,725 09-12-2014, 09:25 PM
Last Post: Guest
  HOSTEL MANAGEMENT SYSTEM pdf seminar tips 3 7,557 09-12-2014, 03:42 PM
Last Post: mkaasees
  scholarship MANAGEMENT SYSTEM seminar tips 6 5,063 12-08-2014, 07:56 AM
Last Post: donsilver
  Color Lab Management System seminar ideas 9 5,271 11-06-2014, 10:04 AM
Last Post: seminar project topic
Last Post: seminar project topic
  Project Ideas- Hostel Management System Using Oracle mvaravinda 0 2,058 29-10-2013, 05:34 PM
Last Post: mvaravinda