Analysis of Adaptive Group Key Management Protocol Using Network Simulator 2
Journal: International Journal of Advanced Networking and Applications (Vol.4, No. 06)Publication Date: 2013-05-06
Authors : Rahul B. Mapari; Prashant M. Adhao;
Page : 1772-1777
Keywords : Backward secrecy; dynamic group; forward secrecy; secure multicast; traffic encryption key;
- Analysis of Adaptive Group Key Management Protocol Using Network Simulator 2
- Analysis of Proactive and Reactive Routing Protocol with a Change in Network Topology for MANET Using Network Simulator
- EFFECTIVE INTRUSION DETECTION SYSTEM FOR AODV ROUTING PROTOCOL USING NETWORK SIMULATOR
- Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator
- SIMULATION & ANALYSIS OF AODV & DSDV ROUTING PROTOCOLS IN UNDERWATER WIRELESS SENSOR NETWORK USING AQUASIM NETWORK SIMULATOR
Abstract
IP Multicast is increasingly used as an efficient communication mechanism for group oriented applications. This success urged the development of security mechanisms for that communication model. In dynamic multicast groups, new members may join or current members may leave the group dynamically. Due to dynamic nature of these multicast groups, the group key is needed to be changed dynamically to maintain group key confidentiality. Existing group key management protocols do not take into consideration the dynamicity of group members. In this paper we first classify proposed protocols for secure multicast and discuss their non suitability for dynamic group. This leads to inefficient solutions for real multicast session. We then propose an efficient protocol, called AKMP, which maintain good performance by adapting the key management process with the membership frequency during the multicast session. A simulation result shows that AKMP is more efficient than existing protocols.
Other Latest Articles
- Deployment of Multicriteria Decision System for National Youth Service Corps (NYSC)
- Comparison of Different Methods to identify wormhole attacks in MANETS
- A review of Fuzzy Based QoS Web Service Discovery
- Simulation Based Performance Comparison Of Various Routing Protocols In MANET Using Network Simulation Tool
- Analysis of Multipath MANET Routing Protocols under Variable Range Transmission Power
Last modified: 2015-12-03 18:36:14