Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

25.05.2016

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

verfasst von: K. Gomathi, B. Parvathavarthini, C. Saravanakumar

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper group key management schemes can be used to encrypt and decrypt the payload. This management is serious task in flexible network like MANET due to dynamic node movement and limited available resources. In order to get away from repeated group key refreshment for entire large network, rekeying done only for sub networks known as clusters. To cope up in this situation, the integrated approach of fuzzy trust based clustering (FTBC) and hierarchical distributed group key management is proposed in this paper. The FTBC isolate misbehaving node from legitimate data transmission and also categorize trusted and distrusted nodes by applying fuzzy logic rules. As well as there is no single solution adopted for all kind of applications, hence two more clustering schemes are proposed namely simple clustering and enhanced distributed weighted clustering are incorporated with key management to satisfy different needs. The performance of our proposal measured by introducing attackers and simulation results prove the proficiency of proposed schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef
2.
Zurück zum Zitat Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.CrossRef Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.CrossRef
3.
Zurück zum Zitat Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.1109/HICSS.2002.994183. Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.​1109/​HICSS.​2002.​994183.
4.
Zurück zum Zitat Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364. Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364.
5.
Zurück zum Zitat Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73. Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73.
6.
Zurück zum Zitat Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.CrossRef Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.CrossRef
7.
Zurück zum Zitat Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41. Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41.
8.
Zurück zum Zitat Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.CrossRef Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.CrossRef
9.
Zurück zum Zitat Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.CrossRef Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.CrossRef
10.
Zurück zum Zitat Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863. Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863.
11.
Zurück zum Zitat Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.CrossRef Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.CrossRef
12.
Zurück zum Zitat Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.CrossRef Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.CrossRef
13.
Zurück zum Zitat Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69. Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69.
14.
Zurück zum Zitat Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.CrossRef Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.CrossRef
15.
Zurück zum Zitat Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410. Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410.
16.
Zurück zum Zitat El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94. El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94.
17.
Zurück zum Zitat Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.1186/1687-1499-2014-161. Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.​1186/​1687-1499-2014-161.
18.
Zurück zum Zitat Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.CrossRef Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.CrossRef
19.
Zurück zum Zitat Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.CrossRef Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.CrossRef
20.
Zurück zum Zitat Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.15680/ijircce.2014.0212072. Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.​15680/​ijircce.​2014.​0212072.
21.
Zurück zum Zitat K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6. K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6.
22.
Zurück zum Zitat Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219. Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219.
Metadaten
Titel
An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management
verfasst von
K. Gomathi
B. Parvathavarthini
C. Saravanakumar
Publikationsdatum
25.05.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3366-x

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt