We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Implementation of Security Services in LMA based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks

Published on April 2012 by R. Jesuraj, D. Shalini Punithavathani
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 4
April 2012
Authors: R. Jesuraj, D. Shalini Punithavathani
79482b5d-81bd-4377-8fca-4ff354d21232

R. Jesuraj, D. Shalini Punithavathani . Implementation of Security Services in LMA based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 4 (April 2012), 6-11.

@article{
author = { R. Jesuraj, D. Shalini Punithavathani },
title = { Implementation of Security Services in LMA based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 4 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 6-11 },
numpages = 6,
url = { /proceedings/icon3c/number4/6025-1026/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A R. Jesuraj
%A D. Shalini Punithavathani
%T Implementation of Security Services in LMA based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%V ICON3C
%N 4
%P 6-11
%D 2012
%I International Journal of Computer Applications
Abstract

Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol to support mobile nodes (MNs) for IP with mobility, without requiring the participation of MNs in any mobility-related signaling. Network based mobility management protocol is more advanced from the host based mobility protocol . Recently, multicast issues in PMIPv6 networks have generated a great deal of interest among researchers, and several multicast schemes had been proposed. However, these schemes do not take security issues into account. Most of the group communications use multicast communication because if the information is sent once by the sender, it will be received by all the users. Main problem in multicast group communication is its security. In order to improve the security, various keys are given to the users. Using the keys the users can encrypt their messages and send secretly. The proposed scheme follows the security mechanism and also indirectly implement the LKH concept. the main advantage of proposed system is its security, Individual key and key encryption key generated by the secure cryptosystem. The proposed system implement the L-MKMS concept with high security

References
  1. S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil,"Proxy Mobile IPv6," RFC 5213, August 2008
  2. J. Guan, Y. Qin, S. Gao, and H. Zhang, "The Performance Analysis of Multicast in Proxy Mobile IPv6," IEEE ICCTA, pp. 719-723, October2009.
  3. D. Wallner, E. Harder, and R. Agee, "Key Management for Multicast:Issues and Architecture," RFC 2627, June 1999.
  4. Ralph C. Merkle, Martin E. Hellman. "Hiding Information and Signatures in Trapdoor Knapsacks", IEEE Transactions on Information Theory, vol. IT-24, 1978, pp. 525-530.
  5. RSA Laboratory (2009), "RSA algorithm time complexity", Retrieved fromhttp://www. rsa. com/rsalabs/node. asp?id=2215 (4 April 2011).
  6. Y. Sun, W. Trappe, and K. J. R. Liu, "An Efficient Key Management Scheme for Secure Wireless Multicast," IEEE ICC, pp. 1236-1240, August 2002.
  7. D. H. Kwon, W. J. Kim, Y. S. Kim, W. S. Im, Y. J. Suh, "Design and Implementation of an Efficient Multicast Support Scheme for FMIPv6," IEEE INFOCOM, pp. 1-12, April 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Proxy Mobile Ipv6 (pmipv6) Multicast Key Management Cryptography