Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Cluster based Cost Effective Group Key Management Protocol for Multicast Network

Print
PDF
IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences
© 2013 by IJCA Journal
ICIIIOES - Number 9
Year of Publication: 2013
Authors:
Saravana Kumar N M
Ramachandran
Lavanya S

Saravana Kumar N M, Ramachandran and Lavanya S. Article: A Cluster based Cost Effective Group Key Management Protocol for Multicast Network. IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences ICIIIOES(9):22-30, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Saravana Kumar N M and Ramachandran and Lavanya S},
	title = {Article: A Cluster based Cost Effective Group Key Management Protocol for Multicast Network},
	journal = {IJCA Proceedings on International Conference on Innovations In Intelligent Instrumentation, Optimization and Electrical Sciences},
	year = {2013},
	volume = {ICIIIOES},
	number = {9},
	pages = {22-30},
	month = {December},
	note = {Full text available}
}

Abstract

Key management plays a very important role in the data communications. CBCEGKM is a key management scheme that provides more efficient and secure methods for key generation and utilization. This papers deals with the analysis of CBCEGKM with respect to communication overhead, computation cost, etc. The analysis shows that CBCEGKM comprises of the most reliable methods for key generations and hence, the data communication. CBCEGKM is compared to some of the other key management techniques and proved to be the better choice in this paper.

References

  • N. M. Saravana Kumar and T. Purusothaman, "CBCEGKM: Scalable and Efficient Group Key Management Scheme in Multicast Networks". European Journal of Scientific Research, ISSN 1450-216X Vol. 89 No 3 October, 2012, pp. 394-408.
  • R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, 2010. Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security, Vol. 11, No. 1, PP. 33{38).
  • Mingyan, Li. , R. Poovendran, C. Berenstein, 2002. Design of Secure Multicast Key Management Schemes With Communication Budget Constraint. IEEE Communications Letters, Vol. 6, No. 3.
  • Pitipatana, S. , Nirwan A. , 2007. Elliptic Curve Cryptosystem-Based Group Key Management For Secure Group Communications. IEEE Military Communications Conference doi: 10. 1109/MILCOM. 2007. 4455002.
  • E. Munivel, J. Lokesh,"Design of Secure Group Key Management Scheme for Multicast Networks using Number Theory". CIMCA, IAWTIC, and ISE. 2008
  • S. Jabeen Begum and Dr. T. Purusothaman, 2011. A New Scalable and Reliable Cost Effective Key Agreement Protocol for Secure Group Communication. Journal of Computer Science 7 (3): 328-340.
  • Xukai Zou, Byrav Ramamurthy, Spyros Magliveras, 2002. Efficient Key Management f or Secure Group Communications with Bursty Behavior. In Proceedings of the IASTED International Conference. Communications, Internet, and Information Technology
  • Shu-Quan Li, Yue Wu, "A Survey on Key Management for Multicast". Second International Conference on Information Technology and Computer Science, 2010
  • Bibo Jiang, Xiulin Hu, "A Survey of Group Key Management". International Conference on Computer Science and Software Engineering. 2008
  • T. Srinivasan, S. Sathish, R. Vi,jay Kumar, M. V. B. Vi,jayender, "A Hybrid Scalable Group Key Management Approach for Large Dynamic Multicast Networks". The Sixth IEEE International Conference on Computer and Information Technology. 2006.
  • Senthamil Ilango, Johnson Thomas, "Group Key Management utilizing Hu?man and Petrick based approaches". Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04). 2004.
  • "Di?e-Hellman Key Exchange". www. math. brown. edu/~jhs/ MathCrypto/SampleSections. pdf.
  • Liming Wang, Chuan-Kun Wu, "Efficient Key Agreement for Large and Dynamic Multicast Groups". International Journal of Network Security, Vol. 3, No. 1, PP . 8–17, July 2006 http://isrc. nchu. edu. tw/ijns/
  • J. Lakshmanaperumal, K. Thanushkodi, N. M. Saravana kumar, K. Saravanan, K. Saravanan, T. Purusothaman "Efficient Key Management Scheme for Secure Multicast in MANET". IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 11, November 2010.
  • Mohamed-Salah Bouassida, Isabelle Chrisment, Olivier Festor, "Group Key Management in MANETs". International Journal of Network Security, Vol. 6, No. 1, PP . 67–79, Jan. 2008.
  • Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, Heba K. Aslan, "A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach". International Journal of Network Security, Vol. 8, No. 1, PP . 75–89, Jan. 2009.
  • Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar, "A Scalable and Distributed Security Protocol for Multicast Communications". International Journal of Network Security, Vol. 12, No. 2, PP. 61{74, Mar. 2011.
  • Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, "Key management for high bandwidth secure multicast". Journal of Computer Security, 693–709, 2004.
  • Steven Pigeon, "Hu?man Coding". http://www. stevenpigeon. com/Publications/publications/HuffmanChapter. pdf
  • Anil Kapil, Sanjeev Rana, "Identity-Based Key Management in MANETs using Public Key Cryptography". International Journal of Security (I,JS), Vol(3), Issue(1), 2009.
  • A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, "Proactive Secret Sharing or How to COpe with Perpetual Leakage". CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp-339-352, Springer-Verlag
  • David A, McGrew and Alan T. Sherman, 2003. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, doi: 10. 1109/TSE. 2003. 1199073
  • M . V. Vijaya Saradhi and B H. Ravi Krishna 2009. A group key management approach for multicast cryptosystems. Journal of Theoretical and Applied Information Technology.
  • Pavithira Loganathan and T. Purushothaman 2011. An Energy Efficient Topology Aware Key Management Scheme for Multicasting in Ad-hoc Networks. International Journal of Wisdom Based Computing, Vol. 1 (3).
  • Panja. B, Madria. S. K, Bhargava. B, "Energy and communication e?cient group key management protocol for hierarchical sensor networks". IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol(1), 2006.