CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Cost Effective Group Key Agreement Protocol for Ad-Hoc Networks

Published on January 2014 by S.devakani, P.chanthiya, K.kumar
International Seminar on Computer Vision 2013
Foundation of Computer Science USA
ISCV - Number 1
January 2014
Authors: S.devakani, P.chanthiya, K.kumar
f059479e-7bd5-4e3c-80f2-5e50c747e34f

S.devakani, P.chanthiya, K.kumar . Cost Effective Group Key Agreement Protocol for Ad-Hoc Networks. International Seminar on Computer Vision 2013. ISCV, 1 (January 2014), 17-27.

@article{
author = { S.devakani, P.chanthiya, K.kumar },
title = { Cost Effective Group Key Agreement Protocol for Ad-Hoc Networks },
journal = { International Seminar on Computer Vision 2013 },
issue_date = { January 2014 },
volume = { ISCV },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 17-27 },
numpages = 11,
url = { /proceedings/iscv/number1/15109-1310/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Seminar on Computer Vision 2013
%A S.devakani
%A P.chanthiya
%A K.kumar
%T Cost Effective Group Key Agreement Protocol for Ad-Hoc Networks
%J International Seminar on Computer Vision 2013
%@ 0975-8887
%V ISCV
%N 1
%P 17-27
%D 2014
%I International Journal of Computer Applications
Abstract

Group communication plays a vital role in collaborative and group-oriented applications. It supports the dissemination of information from a sender to all the receivers in a group. The information needs to be encrypted using a secret key to ensure security in group communication over open networks. Group key establishment involves creating and distributing a common secret key for all group members. This paper proposes a group key agreement protocol that minimizes computation and storage overhead of nodes involved in group communication. Hence this method is mainly suited for ad-hoc networks in which nodes have limited resources and short life time. Group member nodes form a logical tree structure among them. Group key is generated from the leaf to the root node. Then root node unicasts the computed key to every other member. This key is used for the encryption and decryption of group messages. The proposed scheme uses key tree structure to minimize the number of operations on each node. Elliptic Curve Diffie-Hellman minimizes computational overhead at each node and the key with smaller bit size can achieve higher security levels. The tree structure is always maintained as height balanced to minimize the key convergence time among group nodes.

References
  1. Ingemar Ingemarsson, Donald T. Tang, and C. K. Wong,1982, "A conference key distribution system," IEEE Transactions on Information Theory, vol. IT-28, no. 5, pp. 714–720. Mike Burmester and Yvo Desmedt,1994, "A secure and efficient conference key distribution system," in Advances in Cryptology – EUROCRYPT '94, pp. 275–286.
  2. Klaus Becker and Uta Wille,1998, "Communication complexity of group key distribution," in 5th ACM conference on Computer and Communication Security.
  3. Michael Steiner, Gene Tsudik, and Michael Waidner,2000, "Key agreement in dynamic peer groups," IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769– 780.
  4. Y. Kim, A. Perrig, and G. Tsudik, 2004, "Tree-based group key agreement," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60–96.
  5. Hua-yi lin , Tzu-chiangchiang, 2011, "Efficient key agreements in dynamic multicast height balanced tree for secure multicast communications in ad hoc networks", EURASIP journal on wireless communication and networking. ArticleID 382701.
  6. S. Maria Celestin Vigila ,K. Muneeswaran,2011, "ECC based contributory group key computation scheme using one time pad", Journal of computing,volume 3,issue 6.
  7. William stallings,2005," cryptography and network security": principles and practices", fourth edition, prentice hall.
  8. Eric Ricardo Anton, Otto Carlos Muniz Bandeira Duarte,2002," Group Key Establishment in Wireless Ad Hoc Networks", Workshop em Qualidade de Serviço e Mobilidade, Brazil.
Index Terms

Computer Science
Information Sciences

Keywords

Cost Effective