Cargando…
Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks
In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility an...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4365365/ https://www.ncbi.nlm.nih.gov/pubmed/25834838 http://dx.doi.org/10.1155/2015/801632 |
_version_ | 1782362211468967936 |
---|---|
author | Madhusudhanan, B. Chitra, S. Rajan, C. |
author_facet | Madhusudhanan, B. Chitra, S. Rajan, C. |
author_sort | Madhusudhanan, B. |
collection | PubMed |
description | In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. |
format | Online Article Text |
id | pubmed-4365365 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-43653652015-04-01 Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks Madhusudhanan, B. Chitra, S. Rajan, C. ScientificWorldJournal Research Article In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality. Hindawi Publishing Corporation 2015 2015-03-05 /pmc/articles/PMC4365365/ /pubmed/25834838 http://dx.doi.org/10.1155/2015/801632 Text en Copyright © 2015 B. Madhusudhanan et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Madhusudhanan, B. Chitra, S. Rajan, C. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title | Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title_full | Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title_fullStr | Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title_full_unstemmed | Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title_short | Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks |
title_sort | mobility based key management technique for multicast security in mobile ad hoc networks |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4365365/ https://www.ncbi.nlm.nih.gov/pubmed/25834838 http://dx.doi.org/10.1155/2015/801632 |
work_keys_str_mv | AT madhusudhananb mobilitybasedkeymanagementtechniqueformulticastsecurityinmobileadhocnetworks AT chitras mobilitybasedkeymanagementtechniqueformulticastsecurityinmobileadhocnetworks AT rajanc mobilitybasedkeymanagementtechniqueformulticastsecurityinmobileadhocnetworks |