CFP last date
20 January 2025
Reseach Article

Trust based Leader Selection Methodology for P-LeaSel: A Multicast Group Communication Model

by Mary Vennila S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 9
Year of Publication: 2014
Authors: Mary Vennila S
10.5120/15913-5122

Mary Vennila S . Trust based Leader Selection Methodology for P-LeaSel: A Multicast Group Communication Model. International Journal of Computer Applications. 91, 9 ( April 2014), 40-45. DOI=10.5120/15913-5122

@article{ 10.5120/15913-5122,
author = { Mary Vennila S },
title = { Trust based Leader Selection Methodology for P-LeaSel: A Multicast Group Communication Model },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 9 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number9/15913-5122/ },
doi = { 10.5120/15913-5122 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:05.744406+05:30
%A Mary Vennila S
%T Trust based Leader Selection Methodology for P-LeaSel: A Multicast Group Communication Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 9
%P 40-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Multicast is an internetwork group communication service which reduces the transmission overheads. The data can be secured by encrypting it with a group key, shared among all group members [6]. Whenever members join/leave in a group communication, it is essential to preserve the forward and backward confidentiality by sending new keys for transmission. When members join/leave frequently, it gives rise to transmission overhead. Leasel is a multicast group communication model which addresses the problem of scalability due to the multicast transmission overheads. Being a de-centralized group model, a top ranking member of the sub-group is designated as a Leader and authorized to perform key generation and distribution. The identity as "Leader" is hidden to the sub group members. The P-Leasel model, instead of a single leader, identifies 'p' leaders and is alternated for every transaction. Any one leader from the 'p' leaders is authorized to perform key management. This study proposes a trust based leader selection methodology by analyzing trust in selecting Leaders for key generation and distribution. In addition to selecting Leaders based on the static trust computation, allowing the controllers to judge the trustworthiness of leaders dynamically, making better use of the received recommendations directly and indirectly. The simulation experiments show improvements in the security aspects which makes P-Leasel more secured multicast group communication model.

References
  1. Mary Vennila S, Sankaranarayanan V,(2006) , " PLEASE, 'p' Leaser Selection for Multicast Group Communication", IJCSNS : International Journal of Computer Science and Network Security, Vol. 6, No. 11, pp. 277-285.
  2. Elijah Blessing R, Rhymend Uthariaraj V,(2002), " LEASEL : An efficient key management model for scalable secure multicast system", in Procedings of ICORD, India
  3. Mary Vennila S, Sankararanarayanan V, (2007), " G-Leasel : A secure Multicast Model for Grid", IEEE Xplore, Communication Systems Software and Middleware (COMSWARE)
  4. Mary Vennila S, Sankaranarayanan. V,(2007), " Kerberized Leasel Model for Grid", IJCSNS International Journal of Computer Science and network security, Vol. 6, No. 9A,206 pp. 154-160.
  5. Mary Vennila S, Sankaranarayanan V,(2008), " Threat Analysis for P-LeaSel, a multicast group communication model", Asian Journal of Information Technology, Vol. 7, pp. 64-68.
  6. Mittra S,(1997), " IOLUS : A frame work for scalable secure multicasting", Procedings of ACM SIGCOMM, pp. 277-288.
  7. Sugnaya Devi D, Padmavathi G,(2010), " Secure Multicast key distribution for Mobile adhoc networks", International Journal of Computer Science and information Security, Vol. 7, No. 2, pp. 218-222.
  8. Ballardie T, Crowcroft J,(1995) "Multicast specific Secutity Threats and counter measures", Proc. Symposium on Networks and Distributed System Security, San Diego, California, pp. 216.
  9. Butler D, Engert D, Foster I, KesselmanC, Tuecke S, Volmer J, Welch V,(2000), " A national Scale authentication infrastructure" , IEEE Computer, Vol. 33, No. 12, pp. 60-66.
  10. Liu Jing, Zhou Mingtian,(2003), " Secure group communication for large dynamic multicast group", Journal of Electronics, Vol. 20, No. 4, pp. 418-422
  11. SivakamiPriya S, Sumathi G,(2013), " In improved Security and Trusting Model for Computational Grid", International Journal of Grid and Distributed Computing, Vol. 4, No. 1, pp, 57-63.
  12. Bibo Jiang,(2008), " A survey of Group Key Management", International Conference on Computer Science and Software Engineering", pp. 994-1002.
  13. Hong X, Gerla M, Pei G, Chiang C,(1999), "A Group Mobility Model for Ad Hoc Wireless Networks". Proceedings of the 2nd ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. , pp. 53-60.
  14. D. Huang, D. Medhi, (2008), "A Secure Group Key Management Scheme for Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577.
  15. Renuka, K. C. Shet, (2009), "Hierarchical Approach for Key Management in Mobile Ad hoc Networks," IJCSIS , Vol. 5 No. 1,pp 47-53.
  16. Jøsang, Audun, Roslan Ismail, and Colin Boyd, (2007), "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems,Vol. 43, No. 2, pp 618-644.
Index Terms

Computer Science
Information Sciences

Keywords

LeaSel P-LeaSel Trust Group Communication Multicast Security.