SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 6 (August 2012), PP. 64-70


     An Efficient Group Key Management for Wireless Multicast
                            Networks
     Anusha Bandari1, Santoshkumari P.2, Yatelli Prashanti3, Dr. G.Manjunath4
                                         1,2,3
                                             Student, Dept. Of IT, JNIT, Hyderabad.
                                         4
                                          Head, Dept of CSE & IT, JNIT, Hyderabad.



Abstract—In a wireless multicast group, efficient key management is a big challenge due to constant changes in the
network, limited processing capabilities and network constraints. Therefore continuously exchanging keys for peer
authentication consumes tremendous bandwidth. Hence in this work we propose an efficient group key management
technique which authenticates all the nodes in a multicast group by group authentication which eliminates the need for
individual authentication of the nodes. The main challenges for secure multicast are scalability, efficiency and
authenticity. In this project, we propose a scalable, efficient, authenticated group key agreement scheme for fixed
multicast systems. The proposed key agreement scheme is identity-based which uses the combination of AES with
Rinjdal, BLS, RSA. Compared with the existing system, the proposed system provides group member authenticity without
imposing extra mechanism. Furthermore, we give a scalability solution based on the subgroups, which has advantages
over the existing schemes. Security analysis shows that our scheme satisfies both forward secrecy and backward secrecy.
Results shows that the scheme not only provides 100% accuracy in authentication but at the same time maintains
optimum network performance.

Keywords— AES, Wireless Multicast Group, Key management, Security, Authenticity

                                                 I.     INTRODUCTION
          The Efficient Key Agreement for Large and Dynamic Multicast Groups provides an efficient way of Group key
Agreement in terms of Scalability and Authenticity between the Sub group members and to other group members in the
network. The Existing system have the drawbacks such as the Group Controller takes all responsibilities of key generation,
re keys generation, message transmission to its sub group members and also to any other group controllers. So lot of
bottleneck’s to the group controller in the sub group. The sub group’s members are not able to send information’s to any
other subgroup at the time of re keying process. So performance of the sub group degrades at that time. The re keying
process is done every time once a communication is completed between the users in the same group or to any other group
members. One of the main challenges for secure multicast is access control for making sure that only legitimate members of
multicast group have access to the group communication. In the passed two or three decades, cryptography has become the
well established means to solve the security problems in networking. However, there are still a lot of difficulties for directly
deploying cryptography algorithms into multicasting environment as what has been done for unicasting environment. The
commonly used Technique to secure multicast communication is to maintain a group key that is known to all users in the
multicast group, but is unknown to anyone outside the group. Efficiently managing the group key is a difficult problem for
large dynamic groups. Each time a member is added to or evicted from the communication group, the group key must be
refreshed. The members in the group must be able to compute the new group key efficiently, at the same time forward and
backward secrecy must be guaranteed. Because the group re keying is very consumptive and frequently performed due to the
nature of multicast communication, the way to update it in a scalable and secure fashion is required.

A.   Benefits of Efficient Key Agreement for Large and Dynamic Multicast Groups
        Use identity tree based structure
        Less over head on key generation process
        The Group controller responsibilities can be shared by other members in the group (Group control Intermediate )
        Centralized server for the key generation process
        The group members in the same group directly communicate with each other without having the permission of
         authority persons.
        The Group controller key is act as a group key for group to group communication and scalability of the group
        The group members are not affected by the key generation process when they communicate with any other groups.

                                                  II.     MOTIVATION
A.   Existing System
          In the Existing system we use Iolus approach proposed the notion of hierarchy subgroup for scalable and secure
multicast. In this method, a large communication group is divided into smaller subgroups. Each subgroup is treated almost
like a separate multicast group and is managed by a trusted group security intermediary (GSI). GSI connect between the
subgroups and share the subgroup key with each of their subgroup members. GSIs act as message relays and key translators
                                                              64
An Efficient Group Key Management for Wireless Multicast Networks

between the subgroups by receiving the multicast messages from one subgroup, decrypting them and then re multicasting to
the next subgroup after encrypting them by the subgroup key of the next subgroup. The GSIs are also grouped in a top-level
group that is managed by a group security controller (GSC).
When a group member joins or leaves only affect subgroup only while the other subgroup will not be affected. It has the
drawback of affecting data path. This occurs in the sense that there is a need for translating the data that goes from one
subgroup, and thereby one key, to another. This becomes even more problematic when it takes into account that the GSI has
to manage the subgroup and perform the translation needed. The GSI may thus become the bottleneck.

B.   Limitations of the Existing System
      The Group controller takes all responsibilities for the group such as key generation, re keying process and message
        transfer to any other groups
      The group members are not able to communicate with any other groups during the re keying process.
      The Group controller maintains logical key tree where each nodes represents a key encryption key. The root of the
        key tree is the group key used for encrypting data in group communications and it is shared by all Users.

C.    Proposed System
           The advantages over the existing system are, we use an identity tree instead of key tree in our scheme. Each node
in the identity tree is associated with an identity. The leaf node’s identity is corresponding to the user’s identity and the
intermediate node’s identity is generated by its children’s identity. Hence, in an identity tree, an intermediate node represents
a set user in the sub tree rooted at this node.
           The keys used in each subgroup can be generated by a group of key generation centers (KGCs) in parallel. All the
members in the same subgroup can compute the same subgroup key though the keys for them are generated by different
KGCs. This is a desirable feature especially for the large-scale network systems, because it minimizes the problem of
concentrating the workload on a single entity.

D.   Advantages of Proposed System
       The Group controller responsibilities are shared by the Group control intermediater such as Re keying process and
        scalability of the group process.
       Use the Identity tree based structure.
       The group members are not affected by the key generation process when they are willing to communicate with any
        other group members.
       The Centralized key server used for key generation process and the KGC is also act as a Router for group to group
        communication.
       The Re keying process is done only to the particular group members not to the entire group members.

                                       III.      PROBLEM FORMULATION
A. Objectives
The objectives of the project are as follows:
        Design the single multicast group.
        Generation of private keys for users.
        Encoding and decoding of text message
        Secure transmission of session key by using the algorithm Advanced Encryption Standard (AES).
        Secured transmission of data using BLS
        Secured route discovery in inter group messaging using RSA
        Design the multi group with multiple data stream in such a way that reduced overhead of key server.
        Use Identity tree based structure. Each node in the identity tree is associated with an identity. The leaf node’s
         identity is corresponding to the user’s identity and the intermediate node’s identity is generated by its children’s
         identity. Hence, in an identity tree, an intermediate node represents a set of users in the sub tree rooted at this node.

                                              IV.        METHODOLOGY
          The system overview is as follows. Each node can be part of one or more multicast groups. The group dynamic is
presented in the figure below.




                                                               65
An Efficient Group Key Management for Wireless Multicast Networks




                                              Fig. 1 Overview of the System

          At the time of mitigating the network information, each node exchanges hello packets with it's neighbors. The
HEllo message is broadcasted instead of multicasted. A node selects the group it belongs to and sign the packet with it's
private key. The message is recived by the other nodes which decrypts the message using their public key, those nodes that
successfully decrypts the message puts the sender's address in it's neighbors table, thus authenticating the node. This
mechanism successfully authenticates the In-group nodes who do not need separate authentication for message exchange.
The technique is further improved by demonstrating inter group authentication. Whenever a route request is generated from
one group to another, the message is signed by a challenge digest. The groups aware of the inter group communication
decrypts the message with AES. Once a route is formed, data is transferred as encrypted message with BLS technique.
Hence here also for data communication, no separate authentication is needed.

A. Key Generation
Private Key:
      The Private Key is generated using AES. There is no (Group Controller). All the nodes in a group are assumed to know
it's private key as well as the public key of the group.
Session Key:
      In session key generation, initially 128 decimal digits are generated by using random number generation method .Then
each decimal digit is splited and compared with pre determined binary format. In AES algorithm the 128 bits session key is
considered as a message file and generated user’s private key is considered as a key file. AES algorithm encrypts the session
key by using user’s private key and transmitted to the appropriate users.

B.   Joint Operation




                                                   Fig. 2 Join Operation

C.   Message Transmission

                                                            66
An Efficient Group Key Management for Wireless Multicast Networks

          Multicasting is a process of sending a message to a selected group. Internet applications, such as online games,
newscast, stock quotes, multiparty conferences, and military communications can benefit from secure multicast
communications. In most of these applications, users typically receive identical information from a single or multiple
senders. Hence, grouping these users into a single multicast group and providing a common session encryption key to all of
them will reduce the number of message units to be encrypted by the senders. Various types of data communication are
broadcast, Multicast, group communication.




                         Fig. 3 Transmission of the message M through 4 point-to-point connections

          Figure 3 shows the transmission of message m to four point to point connections. Here node number 1 is the
service provider. Nodes 2,3,4,5 are the receiving nodes. Nodes 2,3,4,5 are receiving the same message.

D.   Group communication
          For group communications, the server distributes to each member a group key to be shared by all members of the
group, distributing the group key securely to all members requires messages encrypted with individual keys (a computation
cost proportional to group size). Each such message may be sent separately via unicast. Alternatively, the messages may be
sent as a combined message to all group members via multicast. Either way, there is a communication cost proportional to
group size (measured in terms of the number of messages or the size of the combined message). Observe that for a point-to-
point session, the costs of session establishment and key distribution are incurred just once, at the beginning of the session. A
group session, on the other hand, may persist for a relatively long time with members joining and leaving the session.
Consequently, the group key should be changed frequently. To achieve a high level of security, the group key should be
changed after every join and leave so that a former group member has no access to current communications and a new
member has no access to previous communications.

E.    Authentication
           Authenticity means that when a user receives a message, it is assured about the identity of the sender. The
authenticity requirement can be translated in the context of secure multicast into two requirements on key and data
distribution.
Key authenticity: only the center can generate a session key.
Data authenticity: the users can distinguish among the data sent by the center and the malicious data sent by an attacker.




                                                   Fig. 4 Context Diagram

F.   Message Transmission and Cryptography




                                                              67
An Efficient Group Key Management for Wireless Multicast Networks




                                      Fig. 5 Group to Group Communication




                                       Fig. 6 Same Group Communication

G. Architectural Design
         The Architectural Design is a process of dividing the project components into the processing modules and
conceptual data structures.




                                           Fig. 6 Architectural Design

H. Sequence Design




                                                       68
An Efficient Group Key Management for Wireless Multicast Networks




                         Fig. 7 Sequence Design

                         V.        RESULTS




Fig. 7 Comparison of Packet Delivery Ratio with different number of nodes.




                                   69
An Efficient Group Key Management for Wireless Multicast Networks




                                        Fig. 8 Latency for different number of nodes.




                              Fig. 9 Authentication Success rate for different number of nodes.

            Results show that the authentication success rate of the proposed system is better for larger networks and for more
groups. The system, along with providing best authentication solution provides a good performance as par as the packet
delivery is concerned. Due to authenticating the group through control message exchange the system minimizes the latency.
An easy way to comply with the paper formatting requirements is to use this document as a template and simply type your
text into it.
                                               VI.       CONCLUSIONS
           The Proposed system is an efficient, authenticated, scalable key agreement for communication amongst multicast
systems without the requirement of separate key distribution server. Compared with the Existing system the proposed system
is faster, more scalable and demands less data exchange as HELLO,RREQ and data message carries the authentication
information as encrypted entity. Simulation shows that the rate of misclassification is low and invariable in comparision to
data exchange rate or simulation time. The system can be further improved by incorporating session authentication using
inter group session management.

                                                     REFERENCES
  [1].    Y. Amir, Y.Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G.Tsudik, ”Secure group communication using robust
          contributory key agreement,” IEEE Trans, Parallel Distrib. Syst., vol:15, no.5,pp,468-480, May 2004.
  [2].    G. Ateniese, M. Steiner, and G. Tsudik , “Authenticated group key agreement protocols, ”in Proc.5th Annu. Workshop on
          selected Areas in Cryptography Security(SAC’98),1998,pp. 17-26.
  [3].    S.Blake-Wilson and A.Menezes, “Authenticated Diffie-Hellman Key agreement protocols,” in Proc. 5th Annu. Workshop on
          selected Areas in Cyrptography (SAC’98),1998, vol. LNCS 950, pp. 275-286.
  [4].    W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976.




                                                              70

Mais conteúdo relacionado

Mais procurados

Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network througheSAT Publishing House
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
 
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...IJCI JOURNAL
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...Alexander Decker
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesIOSR Journals
 

Mais procurados (19)

Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
Securing cluster based adhoc network through
Securing cluster based adhoc network throughSecuring cluster based adhoc network through
Securing cluster based adhoc network through
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
H0362052056
H0362052056H0362052056
H0362052056
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
 
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
 
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc NetworksA Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
A Survey of Techniques against Security Threats in Mobile Ad Hoc Networks
 
B018140813
B018140813B018140813
B018140813
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONSA MALICIOUS USERS DETECTING MODEL BASED  ON FEEDBACK CORRELATIONS
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
 
A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 

Destaque

GT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGrant Thornton
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Impact of climate change, land use change and residential mitigation measures...
Impact of climate change, land use change and residential mitigation measures...Impact of climate change, land use change and residential mitigation measures...
Impact of climate change, land use change and residential mitigation measures...Global Risk Forum GRFDavos
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Global Risk Forum GRFDavos
 
ο αγιος γεωργιος ιωαννινων
ο αγιος γεωργιος ιωαννινωνο αγιος γεωργιος ιωαννινων
ο αγιος γεωργιος ιωαννινωνgymzosim
 
World Health Organization: health security preparedness
World Health Organization: health security preparednessWorld Health Organization: health security preparedness
World Health Organization: health security preparednessGlobal Risk Forum GRFDavos
 
"Community Development Digital Literacy for Uganda Leaders"
"Community Development Digital Literacy for Uganda Leaders""Community Development Digital Literacy for Uganda Leaders"
"Community Development Digital Literacy for Uganda Leaders"Chrysalis Campaign, Inc.
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
מקורות טבעיים חשמל
מקורות טבעיים חשמלמקורות טבעיים חשמל
מקורות טבעיים חשמלsharonaahdbiuh
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
「次世代同居の家」金内浩之
「次世代同居の家」金内浩之「次世代同居の家」金内浩之
「次世代同居の家」金内浩之Hiroyuki Kanauchi
 
純粋培養プログラマーへのFireworksのススメ
純粋培養プログラマーへのFireworksのススメ純粋培養プログラマーへのFireworksのススメ
純粋培養プログラマーへのFireworksのススメNatsumi Kashiwa
 

Destaque (18)

GT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, US
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Impact of climate change, land use change and residential mitigation measures...
Impact of climate change, land use change and residential mitigation measures...Impact of climate change, land use change and residential mitigation measures...
Impact of climate change, land use change and residential mitigation measures...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Log Analysis to Understand Medical Professionals' Image Searching Behaviour
Log Analysis to Understand Medical Professionals' Image Searching BehaviourLog Analysis to Understand Medical Professionals' Image Searching Behaviour
Log Analysis to Understand Medical Professionals' Image Searching Behaviour
 
Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...Integrated assessment of high mountain hazards and related prevention strateg...
Integrated assessment of high mountain hazards and related prevention strateg...
 
ο αγιος γεωργιος ιωαννινων
ο αγιος γεωργιος ιωαννινωνο αγιος γεωργιος ιωαννινων
ο αγιος γεωργιος ιωαννινων
 
World Health Organization: health security preparedness
World Health Organization: health security preparednessWorld Health Organization: health security preparedness
World Health Organization: health security preparedness
 
"Community Development Digital Literacy for Uganda Leaders"
"Community Development Digital Literacy for Uganda Leaders""Community Development Digital Literacy for Uganda Leaders"
"Community Development Digital Literacy for Uganda Leaders"
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
מקורות טבעיים חשמל
מקורות טבעיים חשמלמקורות טבעיים חשמל
מקורות טבעיים חשמל
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
「次世代同居の家」金内浩之
「次世代同居の家」金内浩之「次世代同居の家」金内浩之
「次世代同居の家」金内浩之
 
純粋培養プログラマーへのFireworksのススメ
純粋培養プログラマーへのFireworksのススメ純粋培養プログラマーへのFireworksのススメ
純粋培養プログラマーへのFireworksのススメ
 

Semelhante a IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...csandit
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...cscpconf
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONacijjournal
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSenetas
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Sai Vikas Gunti
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
 
Key Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxKey Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxparuvathavardhinij
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmJPINFOTECH JAYAPRAKASH
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET Journal
 
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...CrimsonPublishersRDMS
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudAvinash K S
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Mumbai Academisc
 

Semelhante a IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
securemult
securemultsecuremult
securemult
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
 
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATIONA SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmission
 
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
Secure key exchange thrtough elgamal cryptography in ad hoc networks ijser fo...
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Key Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptxKey Management Techniques in Wireless Sensor Networks.pptx
Key Management Techniques in Wireless Sensor Networks.pptx
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
 
Mona final review
Mona final reviewMona final review
Mona final review
 
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...
 

Mais de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mais de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 6 (August 2012), PP. 64-70 An Efficient Group Key Management for Wireless Multicast Networks Anusha Bandari1, Santoshkumari P.2, Yatelli Prashanti3, Dr. G.Manjunath4 1,2,3 Student, Dept. Of IT, JNIT, Hyderabad. 4 Head, Dept of CSE & IT, JNIT, Hyderabad. Abstract—In a wireless multicast group, efficient key management is a big challenge due to constant changes in the network, limited processing capabilities and network constraints. Therefore continuously exchanging keys for peer authentication consumes tremendous bandwidth. Hence in this work we propose an efficient group key management technique which authenticates all the nodes in a multicast group by group authentication which eliminates the need for individual authentication of the nodes. The main challenges for secure multicast are scalability, efficiency and authenticity. In this project, we propose a scalable, efficient, authenticated group key agreement scheme for fixed multicast systems. The proposed key agreement scheme is identity-based which uses the combination of AES with Rinjdal, BLS, RSA. Compared with the existing system, the proposed system provides group member authenticity without imposing extra mechanism. Furthermore, we give a scalability solution based on the subgroups, which has advantages over the existing schemes. Security analysis shows that our scheme satisfies both forward secrecy and backward secrecy. Results shows that the scheme not only provides 100% accuracy in authentication but at the same time maintains optimum network performance. Keywords— AES, Wireless Multicast Group, Key management, Security, Authenticity I. INTRODUCTION The Efficient Key Agreement for Large and Dynamic Multicast Groups provides an efficient way of Group key Agreement in terms of Scalability and Authenticity between the Sub group members and to other group members in the network. The Existing system have the drawbacks such as the Group Controller takes all responsibilities of key generation, re keys generation, message transmission to its sub group members and also to any other group controllers. So lot of bottleneck’s to the group controller in the sub group. The sub group’s members are not able to send information’s to any other subgroup at the time of re keying process. So performance of the sub group degrades at that time. The re keying process is done every time once a communication is completed between the users in the same group or to any other group members. One of the main challenges for secure multicast is access control for making sure that only legitimate members of multicast group have access to the group communication. In the passed two or three decades, cryptography has become the well established means to solve the security problems in networking. However, there are still a lot of difficulties for directly deploying cryptography algorithms into multicasting environment as what has been done for unicasting environment. The commonly used Technique to secure multicast communication is to maintain a group key that is known to all users in the multicast group, but is unknown to anyone outside the group. Efficiently managing the group key is a difficult problem for large dynamic groups. Each time a member is added to or evicted from the communication group, the group key must be refreshed. The members in the group must be able to compute the new group key efficiently, at the same time forward and backward secrecy must be guaranteed. Because the group re keying is very consumptive and frequently performed due to the nature of multicast communication, the way to update it in a scalable and secure fashion is required. A. Benefits of Efficient Key Agreement for Large and Dynamic Multicast Groups  Use identity tree based structure  Less over head on key generation process  The Group controller responsibilities can be shared by other members in the group (Group control Intermediate )  Centralized server for the key generation process  The group members in the same group directly communicate with each other without having the permission of authority persons.  The Group controller key is act as a group key for group to group communication and scalability of the group  The group members are not affected by the key generation process when they communicate with any other groups. II. MOTIVATION A. Existing System In the Existing system we use Iolus approach proposed the notion of hierarchy subgroup for scalable and secure multicast. In this method, a large communication group is divided into smaller subgroups. Each subgroup is treated almost like a separate multicast group and is managed by a trusted group security intermediary (GSI). GSI connect between the subgroups and share the subgroup key with each of their subgroup members. GSIs act as message relays and key translators 64
  • 2. An Efficient Group Key Management for Wireless Multicast Networks between the subgroups by receiving the multicast messages from one subgroup, decrypting them and then re multicasting to the next subgroup after encrypting them by the subgroup key of the next subgroup. The GSIs are also grouped in a top-level group that is managed by a group security controller (GSC). When a group member joins or leaves only affect subgroup only while the other subgroup will not be affected. It has the drawback of affecting data path. This occurs in the sense that there is a need for translating the data that goes from one subgroup, and thereby one key, to another. This becomes even more problematic when it takes into account that the GSI has to manage the subgroup and perform the translation needed. The GSI may thus become the bottleneck. B. Limitations of the Existing System  The Group controller takes all responsibilities for the group such as key generation, re keying process and message transfer to any other groups  The group members are not able to communicate with any other groups during the re keying process.  The Group controller maintains logical key tree where each nodes represents a key encryption key. The root of the key tree is the group key used for encrypting data in group communications and it is shared by all Users. C. Proposed System The advantages over the existing system are, we use an identity tree instead of key tree in our scheme. Each node in the identity tree is associated with an identity. The leaf node’s identity is corresponding to the user’s identity and the intermediate node’s identity is generated by its children’s identity. Hence, in an identity tree, an intermediate node represents a set user in the sub tree rooted at this node. The keys used in each subgroup can be generated by a group of key generation centers (KGCs) in parallel. All the members in the same subgroup can compute the same subgroup key though the keys for them are generated by different KGCs. This is a desirable feature especially for the large-scale network systems, because it minimizes the problem of concentrating the workload on a single entity. D. Advantages of Proposed System  The Group controller responsibilities are shared by the Group control intermediater such as Re keying process and scalability of the group process.  Use the Identity tree based structure.  The group members are not affected by the key generation process when they are willing to communicate with any other group members.  The Centralized key server used for key generation process and the KGC is also act as a Router for group to group communication.  The Re keying process is done only to the particular group members not to the entire group members. III. PROBLEM FORMULATION A. Objectives The objectives of the project are as follows:  Design the single multicast group.  Generation of private keys for users.  Encoding and decoding of text message  Secure transmission of session key by using the algorithm Advanced Encryption Standard (AES).  Secured transmission of data using BLS  Secured route discovery in inter group messaging using RSA  Design the multi group with multiple data stream in such a way that reduced overhead of key server.  Use Identity tree based structure. Each node in the identity tree is associated with an identity. The leaf node’s identity is corresponding to the user’s identity and the intermediate node’s identity is generated by its children’s identity. Hence, in an identity tree, an intermediate node represents a set of users in the sub tree rooted at this node. IV. METHODOLOGY The system overview is as follows. Each node can be part of one or more multicast groups. The group dynamic is presented in the figure below. 65
  • 3. An Efficient Group Key Management for Wireless Multicast Networks Fig. 1 Overview of the System At the time of mitigating the network information, each node exchanges hello packets with it's neighbors. The HEllo message is broadcasted instead of multicasted. A node selects the group it belongs to and sign the packet with it's private key. The message is recived by the other nodes which decrypts the message using their public key, those nodes that successfully decrypts the message puts the sender's address in it's neighbors table, thus authenticating the node. This mechanism successfully authenticates the In-group nodes who do not need separate authentication for message exchange. The technique is further improved by demonstrating inter group authentication. Whenever a route request is generated from one group to another, the message is signed by a challenge digest. The groups aware of the inter group communication decrypts the message with AES. Once a route is formed, data is transferred as encrypted message with BLS technique. Hence here also for data communication, no separate authentication is needed. A. Key Generation Private Key: The Private Key is generated using AES. There is no (Group Controller). All the nodes in a group are assumed to know it's private key as well as the public key of the group. Session Key: In session key generation, initially 128 decimal digits are generated by using random number generation method .Then each decimal digit is splited and compared with pre determined binary format. In AES algorithm the 128 bits session key is considered as a message file and generated user’s private key is considered as a key file. AES algorithm encrypts the session key by using user’s private key and transmitted to the appropriate users. B. Joint Operation Fig. 2 Join Operation C. Message Transmission 66
  • 4. An Efficient Group Key Management for Wireless Multicast Networks Multicasting is a process of sending a message to a selected group. Internet applications, such as online games, newscast, stock quotes, multiparty conferences, and military communications can benefit from secure multicast communications. In most of these applications, users typically receive identical information from a single or multiple senders. Hence, grouping these users into a single multicast group and providing a common session encryption key to all of them will reduce the number of message units to be encrypted by the senders. Various types of data communication are broadcast, Multicast, group communication. Fig. 3 Transmission of the message M through 4 point-to-point connections Figure 3 shows the transmission of message m to four point to point connections. Here node number 1 is the service provider. Nodes 2,3,4,5 are the receiving nodes. Nodes 2,3,4,5 are receiving the same message. D. Group communication For group communications, the server distributes to each member a group key to be shared by all members of the group, distributing the group key securely to all members requires messages encrypted with individual keys (a computation cost proportional to group size). Each such message may be sent separately via unicast. Alternatively, the messages may be sent as a combined message to all group members via multicast. Either way, there is a communication cost proportional to group size (measured in terms of the number of messages or the size of the combined message). Observe that for a point-to- point session, the costs of session establishment and key distribution are incurred just once, at the beginning of the session. A group session, on the other hand, may persist for a relatively long time with members joining and leaving the session. Consequently, the group key should be changed frequently. To achieve a high level of security, the group key should be changed after every join and leave so that a former group member has no access to current communications and a new member has no access to previous communications. E. Authentication Authenticity means that when a user receives a message, it is assured about the identity of the sender. The authenticity requirement can be translated in the context of secure multicast into two requirements on key and data distribution. Key authenticity: only the center can generate a session key. Data authenticity: the users can distinguish among the data sent by the center and the malicious data sent by an attacker. Fig. 4 Context Diagram F. Message Transmission and Cryptography 67
  • 5. An Efficient Group Key Management for Wireless Multicast Networks Fig. 5 Group to Group Communication Fig. 6 Same Group Communication G. Architectural Design The Architectural Design is a process of dividing the project components into the processing modules and conceptual data structures. Fig. 6 Architectural Design H. Sequence Design 68
  • 6. An Efficient Group Key Management for Wireless Multicast Networks Fig. 7 Sequence Design V. RESULTS Fig. 7 Comparison of Packet Delivery Ratio with different number of nodes. 69
  • 7. An Efficient Group Key Management for Wireless Multicast Networks Fig. 8 Latency for different number of nodes. Fig. 9 Authentication Success rate for different number of nodes. Results show that the authentication success rate of the proposed system is better for larger networks and for more groups. The system, along with providing best authentication solution provides a good performance as par as the packet delivery is concerned. Due to authenticating the group through control message exchange the system minimizes the latency. An easy way to comply with the paper formatting requirements is to use this document as a template and simply type your text into it. VI. CONCLUSIONS The Proposed system is an efficient, authenticated, scalable key agreement for communication amongst multicast systems without the requirement of separate key distribution server. Compared with the Existing system the proposed system is faster, more scalable and demands less data exchange as HELLO,RREQ and data message carries the authentication information as encrypted entity. Simulation shows that the rate of misclassification is low and invariable in comparision to data exchange rate or simulation time. The system can be further improved by incorporating session authentication using inter group session management. REFERENCES [1]. Y. Amir, Y.Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G.Tsudik, ”Secure group communication using robust contributory key agreement,” IEEE Trans, Parallel Distrib. Syst., vol:15, no.5,pp,468-480, May 2004. [2]. G. Ateniese, M. Steiner, and G. Tsudik , “Authenticated group key agreement protocols, ”in Proc.5th Annu. Workshop on selected Areas in Cryptography Security(SAC’98),1998,pp. 17-26. [3]. S.Blake-Wilson and A.Menezes, “Authenticated Diffie-Hellman Key agreement protocols,” in Proc. 5th Annu. Workshop on selected Areas in Cyrptography (SAC’98),1998, vol. LNCS 950, pp. 275-286. [4]. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976. 70