Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

25-05-2016

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

Authors: K. Gomathi, B. Parvathavarthini, C. Saravanakumar

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper group key management schemes can be used to encrypt and decrypt the payload. This management is serious task in flexible network like MANET due to dynamic node movement and limited available resources. In order to get away from repeated group key refreshment for entire large network, rekeying done only for sub networks known as clusters. To cope up in this situation, the integrated approach of fuzzy trust based clustering (FTBC) and hierarchical distributed group key management is proposed in this paper. The FTBC isolate misbehaving node from legitimate data transmission and also categorize trusted and distrusted nodes by applying fuzzy logic rules. As well as there is no single solution adopted for all kind of applications, hence two more clustering schemes are proposed namely simple clustering and enhanced distributed weighted clustering are incorporated with key management to satisfy different needs. The performance of our proposal measured by introducing attackers and simulation results prove the proficiency of proposed schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef
2.
go back to reference Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.CrossRef Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.CrossRef
3.
go back to reference Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.1109/HICSS.2002.994183. Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.​1109/​HICSS.​2002.​994183.
4.
go back to reference Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364. Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364.
5.
go back to reference Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73. Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73.
6.
go back to reference Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.CrossRef Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.CrossRef
7.
go back to reference Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41. Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41.
8.
go back to reference Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.CrossRef Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.CrossRef
9.
go back to reference Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.CrossRef Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.CrossRef
10.
go back to reference Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863. Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863.
11.
go back to reference Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.CrossRef Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.CrossRef
12.
go back to reference Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.CrossRef Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.CrossRef
13.
go back to reference Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69. Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69.
14.
go back to reference Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.CrossRef Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.CrossRef
15.
go back to reference Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410. Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410.
16.
go back to reference El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94. El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94.
17.
go back to reference Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.1186/1687-1499-2014-161. Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.​1186/​1687-1499-2014-161.
18.
go back to reference Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.CrossRef Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.CrossRef
19.
go back to reference Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.CrossRef Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.CrossRef
20.
go back to reference Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.15680/ijircce.2014.0212072. Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.​15680/​ijircce.​2014.​0212072.
21.
go back to reference K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6. K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6.
22.
go back to reference Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219. Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219.
Metadata
Title
An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management
Authors
K. Gomathi
B. Parvathavarthini
C. Saravanakumar
Publication date
25-05-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3366-x

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue