International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

The difficulty of effectively and securely broadcasting to a remote cooperative group happens in many freshly appearing networks. A foremost dispute in developing such systems is to over whelm the obstacles of the potentially restricted connection from the assembly to the sender, the unavailability of a completely trusted key generation center, and the dynamics of the sender. The novel, living key administration paradigms cannot deal with these trials effectively. In this paper, we circumvent these obstacles and close this gap by suggesting a innovative key administration paradigm. The new paradigm is a hybrid of customary broadcast encryption and assembly key agreement. In such a scheme, each constituent sustains a single public/secret key two. Upon seeing the public keys of the members, a isolated sender can securely broadcast to any proposed subgroup selected in an publicity hoc way. Following this form, we instantiate a scheme that is verified protected in the standard form. Even if all the no proposed constituents collude, they will not extract any helpful data from the conveyed messages. After the public assembly encryption key is extracted, both the computation overhead and the connection cost are independent of the group dimensions. Furthermore, our scheme facilitates easy yet efficient member deletion/addition and flexible rekeying schemes. Its powerful security against collusion, its unchanging overhead, and its implementation friendliness without relying on a fully trusted administration render our protocol a very under taking solution to many applications.

Keywords: Ad hoc networks, broadcast, cooperative computing, access control, information security, key management

Edition: Volume 3 Issue 10, October 2014

Pages: 781 - 785


How to Cite this Article?

P. Harikrishna, K. V. Srinivasa Rao, "Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14189, Volume 3 Issue 10, October 2014, 781 - 785

25 PDF Views | 29 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Ad hoc networks'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2118 - 2123

QoS Support for Cross-Layer Scheduling Algorithm in Wireless Networks

K. Raghavendra Rao, Vadipina Amarnadh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 275 - 278

Enhancement of Energy and Network Lifetime of MANETs through EC-MAC Protocol

Shafna.P.M, S. Pathur Nisha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1586 - 1593

Optimization of Geocast Routing in Vehicular Ad-Hoc Networks

Rajwinder Singh, Amandeep Kaur Virk

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article



Similar Articles with Keyword 'broadcast'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 707 - 710

Chronological Comparison for Organizing Summaries of Content Anatomy

A. Geetha Vani, B. Naresh Achari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1016 - 1018

Detecting the Plant Diseases and Issues by Image Processing Technique and Broadcasting

K. R. Gokulakrishnan, Kapilya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2213 - 2217

Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System

Shruti Bandak, Rekha Patil

Share this article



Similar Articles with Keyword 'access control'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1087 - 1088

A Survey on the Various Techniques of Data Leakage Detection

Saranya S. Devan, Minu Lalitha Madhavu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1221 - 1224

Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

A. Vineth, John Deva Prasanna

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1079 - 1082

Information Leak Detection and Prevention

Deepika. S. Patil, Dr. Sujata Terdal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this article



Similar Articles with Keyword 'information security'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1053 - 1061

An Efficient Approach in Protection of Information Security via Collaborative Inference Detection

Abilesh. P

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2347 - 2349

A Survey on Security and Accuracy Constrained Privacy Preserving Task Based Access Control Mechanism for Relational Data

Pratik Bhingardeve, D. H. Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this article



Similar Articles with Keyword 'key management'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2213 - 2217

Public Key Cryptography based Secured Dynamic Routing in VANET Time Stamp based Key Management System

Shruti Bandak, Rekha Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1491 - 1494

DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS, Sreetha V Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this article
Top