Skip to main content

A Secure and Computational-Efficient Multicast Key Distribution for Wireless Networks

  • Conference paper
  • First Online:
  • 875 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 768))

Abstract

In the present research work a simulation mechanism has been designed and implemented for a secure, computation efficient and dynamic multicast key distribution system that can be applicable to wireless networks. The present model uses the concept of Maximum Distance Separable (MDS) codes to enhance the computation efficiency of the multicast key distribution system. Also an attempt has been made to improve the security of the multicast key distribution system against the previous multicast group members that had turned into adversaries. By encrypting the newly generated keys with the older one may provide improved security to the system. The DES algorithm has been used for encryption of the new session keys. The implemented results have presented and discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Datta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self healing key distribution with revocation in wireless ad hoc networks. Ad hoc Netw. 8(6), 597–613 (2010). http://doi.org/10.1016/j.adhc.2009.11.005

  2. Suganyadevi, D., Padmavathi, G.: Energy efficient CBMT for secure multicast key distribution in mobile and adhoc networks. Procedia Comput. Sci. 2, 248–255 (2010)

    Article  Google Scholar 

  3. Zhou, J., Ou, Y.: Key tree and Chinese reminder theorem based group key distribution scheme. In: Hun, A., Chang, S.L. (eds.): Algorithms and Architectures for Parallel Processing, ICA3PP2009(LNCS), pp. 254–265 (2009)

    Google Scholar 

  4. Planisamy, V., Annadurai, P.: Secure group communication using multicast key distribution scheme in adhoc networks. IJCA 1(25), 86–91 (2010) (www.ijcaonline.com)

  5. Vijaykumar, P., Bose, S., Kannan., Deborah, L.J.: Computation and communication efficient key distribution protocol for secure multicast communication. KSII Trans. Internet Inf. syst. 7, 878–894 (2013). https://doi.org/10.3837/tiis.2013.04.016

  6. Manjul, M., Mishra, R.: Secure group communication based on elliptic curve cryptography. Trans. Netw. Commun. 2(1) (2014). https://doi.org/10.14738/tnc.21.7

  7. Vijay, A., Kumar, D.S.: Elliptic curve for secure group key management in distributed networks. IJCER 6(6), 21–28 (2016) (www.ijceronline.com)

  8. Hanatani, Y., Ogura, N., Ohba, Y., Chen, L., Das, S.: Secure multicast group management and key distribution in IEEE 802.21. In: Chen, L., et al. (eds.): Security Standardisation Research, SSR2016, LNCS10074, pp. 227–243 (2016). https://doi.org/10.1007/978-3-319-49100-4_10

  9. Yadav, A.K., Soni, S.: Secure multicast key distribution in mobile and adhoc networks. Adv. Wirel. Commun. 10(4), 781–782 (2017) (www.ripublication.com)

  10. Zhu, H.: An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries. Sci. China Inf. Sci. 60, 52109 (2017). https://doi.org/10.1007/s11432-014-0911-8

  11. Xu, L., Huang, C.: Computing efficient multicast key distribution. IEEE Trans. Parallel Distrib. Syst. 19(5), 577–586 (2008)

    Article  Google Scholar 

  12. Sivani, Y.V., Sudha, T.: A novel approach for secured symmetric key distribution in dynamic multicast network. IJERA 1(4), 1441–1447 (2011) (www.ijera.com)

  13. Rani, D., Babu, K.G.P.: Computationally efficient group keying for time sensitive applications. IJCER 2, 589–595 (2012) (www.ijceronline.com)

  14. Madhusudhan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile and adhoc networks. Sci. World J. 2015 (2015) (Article id: 801632). https://dx.doi.org/10.1155/2015/801632

  15. Amara, S.O., Beghdad, R., Oussalah, M.: Securing wireless sensor networks: a survey. J. EDPACS 47(2), 6–29 (2013)

    Article  Google Scholar 

  16. Seetha, R., Saravanan, R.: A survey on group key management schemes. Cybern. Inf. Technol. 15(3), 3–25 (2015). https://doi.org/10.1515/cait-2015-0038

  17. El-Bashary, M., Abdelhafez, A., Anis, W.: A comparative study of group key management in MANET. IJERA 5(8), 85–94 (2015) (www.ijera.com)

  18. Fu, K., Kamara, S., Kohno, T.: Key regression: enabling efficient key distribution for secure distributed storage. In: Proceedings of the NDSS’06 (2006) (www.microsoft.com)

Download references

Acknowledgements

B. Srinivasa Rao is very much thankful to Dr. L. Pratap Reddy, Professor, Department of ECE, JNTUH, Hyderabad, for his valuable suggestions. The author is also thankful to the Management of GRIET for their encouragement and cooperation for pursuing his Ph.D. work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Srinivasa Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srinivasa Rao, B., Premchand, P. (2019). A Secure and Computational-Efficient Multicast Key Distribution for Wireless Networks. In: Mallick, P., Balas, V., Bhoi, A., Zobaa, A. (eds) Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-13-0617-4_10

Download citation

Publish with us

Policies and ethics