Hybrid intelligence system using fuzzy inference in cluster architecture for secured group communication

  • M. Sayeekumar
  • G. M. KarthikEmail author
  • S. Puhazholi


The complication of efficient group communication design in real-world application has been continuously increasing. More factors have to be taken into account continuously before any decision about the rekeying process in cluster architecture could be derived. In this scenario the decision-making process should be efficient and optimal; therefore, fuzzy inference system can be implemented for fast decision making in rekeying process. Secured and efficient group communication can be attained by deploying fuzzy-based inference system in hybrid clustered architecture of group communication. The aim of this proposed model is to reduce the communication and computation complexity of the system using fuzzy-based inference system. In this proposed model, a fuzzy inference system is designed with the function for membership in the group, and the manipulation on input–output relations is concluded. Moreover, by implementing the proposed system, complexity overhead is reduced due to efficient framework and minimized key management. Simulation is done to verify the efficiency of proposed model for the members, to subscribe the service pack with a requested time slot.


Fuzzy inference system Hybrid intelligence Secure group communication Rekeying Computation complexity 


Compliance with ethical standards

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Balachandran RK, Ramamurthy B, Xukai Z, Vinodchandran NV (2005) CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: IEEE international conference on communications, (ICC 2005), vol 2, pp 1123–1127Google Scholar
  2. Bastani FB, Chen I-R, Tsao T (1994) Reliability of systems with fuzzy-failure criterion. In: Annual reliability and maintainability symposium, Anaheim, CA, pp 442–448Google Scholar
  3. Karthik GM, Karthik S (2014) Growth and performance monitoring of web-log file using CBFP and generating cache hits for query templates. Aust J Basic Appl Sci 9(1):194–204Google Scholar
  4. Kim H, Hong SM, Yoon H, Cho JW (2005) Secure group communication with multiplicative one-way functions. In: Proceedings of the international conference on information technology: coding and computing, (ITCC’05), IEEE Computer Society Washington, DC, USA, pp 685–690. An effective subscription based hybrid cluster architecture using confidence 10701
  5. Kumar MS, Purusothaman T (2015) Hybrid broadcast group management protocol for secure, scalable and efficient group communication. J Comput Sci 11(2):344–350 ISSN: 1549-3636 CrossRefGoogle Scholar
  6. Lee FY, Shieh S (2004) Scalable and lightweight key distribution for secure group communications. Int J Netw Manag 3:167–176. CrossRefGoogle Scholar
  7. Li Z, Li L, Zhu F, Zhao Q (2010) A new algorithm of closeness degree for fuzzy pattern recognition. Int J Intell Eng Syst 3(4):9–16Google Scholar
  8. Manz D, Oman P, Foss JA (2010) A framework for group key management protocol assessment independent of view synchrony. J Comput Sci 6:229–234. CrossRefGoogle Scholar
  9. Mao Y, Sun Y, Wu M, Liu KJR (2004) JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE Trans Netw 14:1128–1140. CrossRefGoogle Scholar
  10. Poovendran MLR, McGrew DA (2004) Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inf Proc Lett 93:191–198. MathSciNetzbMATHGoogle Scholar
  11. Pour AN, Kumekawa K, Kato T, Itoh S (2007) A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. Comput Netw 51:4727–4743. CrossRefzbMATHGoogle Scholar
  12. Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35:309–329. CrossRefGoogle Scholar
  13. Saroit IA, El-Zoghdy SF, Matar M (2009) A scalable and distributed security protocol for multicast communications. Int J Network Secur 12:61–74Google Scholar
  14. Supraja P, Jayashri S (2017a) Optimized neural network for spectrum prediction scheme in cognitive radio. Wirel Pers Commun 94(4):2597–2611. ISSN: 0929-6212 CrossRefGoogle Scholar
  15. Supraja P, Jayashri S (2017) Subcarrier and power allocation for OFDMA-based cognitive radio systems with JOUSAM for tele medicine application. Res J Biotechnol. ISSN: 0973-6263/2278-4535Google Scholar
  16. Supraja P, Pitchai R, Raja, (2017) Spectrum prediction in cognitive radio with hybrid optimized neural network. Mobile Netw Appl.
  17. Tom RJ, Sankaranarayanan S (2018) Performance evaluation of RPL routing protocol for IoT based power distribution network. In: Bhattacharyya P, Sastry H, Marriboyina V, Sharma R (eds) Smart and innovative trends in next generation computing technologies. NGCT 2017. Communications in computer and information science, vol 828. Springer, Berlin. Google Scholar
  18. Veeramanikandan M, Sankaranarayanan S (2017) Publish/subscribe broker based architecture for fog computing. In: IEEE explorer, international conference on energy, communication, data analytics and soft computing (ICECDS), pp 1024–1026Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information TechnologySRM Institute of Science and TechnologyKattankulathurIndia

Personalised recommendations