Key Pre Distribution for Multicast Groups using Two Server Authentication in WSN
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 118 | Weekly Hits: ⮙3

Research Paper | Electronics & Communication Engineering | India | Volume 3 Issue 9, September 2014

Key Pre Distribution for Multicast Groups using Two Server Authentication in WSN

Maddineni Ramchandra, T. Madhavi Kumari

Presented the sensitivity in the potential WSN purposes and on account of resource constraints, key management emerges as being a challenging difficulty for WSNs. One of the many concerns when designing a crucial management scheme would be the network scalability. Certainly, the process should support a large number of nodes permit a significant scale deployment in the network. In this paper, we propose a new scalable crucial management program for WSNs which gives beneficial secure connection coverage. For this purpose, we use the unital layout theory. We show which the basic mapping via unitals to help key pre- distribution we can achieve large network scalability. Even so, this trusting mapping does not guarantee an increased key discussing probability. Therefore, we suggest an increased unital-based crucial pre-distribution program providing large network scalability along with good crucial sharing possibility approximately reduce bounded. We prolong this recommended system by providing new several group crucial management (MGKM) program, named the actual master-key-encryption-based MGKM (MKE-MGKM) program, which can reduce the rekeying cost from taking care of multiple collection keys. The real key idea in the MKEMGKM should be to employ an asymmetric encryption program, called the actual master crucial encryption (MKE), to further improve the rekeying efficiency by relieving the rekeying cost. new several group crucial management (MGKM) program, named the actual master-key-encryption-based MGKM (MKE-MGKM) program, which can reduce the rekeying cost from taking care of multiple collection keys. The real key idea in the MKEMGKM should be to employ an asymmetric encryption program, called the actual master crucial encryption (MKE), to further improve the rekeying efficiency by relieving the rekeying cost. To boost the security we all propose a new symmetric remedy for two-server PAKE. In every existing two-server PAKE standards, two servers are offered random pass word shares pw1 along with pw2 subject to pw1 along with pw2. Within our protocol, you can expect one server S1 through an encryption in the password along with another server S2 through an encryption in the password in which pk1 along with pk2 include the encryption tips of S1 along with S2, respectively. Furthermore, two servers are offered random pass word shares b1 along with b2, where H is a hash purpose.

Keywords: WSN, Security, Key Management, Scalability

Edition: Volume 3 Issue 9, September 2014

Pages: 240 - 245

Share this Article

How to Cite this Article?

Maddineni Ramchandra, T. Madhavi Kumari, "Key Pre Distribution for Multicast Groups using Two Server Authentication in WSN", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14160, Volume 3 Issue 9, September 2014, 240 - 245

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'WSN'

Downloads: 45 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1842 - 1847

A Novel Mac Based Congestion Control System for VANET with Adaptive Routing

Mahanthgouda, Sridhara. K

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Electronics & Communication Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1958 - 1964

A Survey - Energy Efficient Routing Protocols in WSN

Fathima Nasrin KM, Shaniba Asmi

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2306 - 2309

First Node Die (FND) Time Enhancement in LEACH Protocol

Naveen Chawla, Ashish Jasuja

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1052 - 1058

Intrusion Detection System in Wireless Sensor Networks

Sarfraz Ali

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2594 - 2597

Analysis of Cluster Lifetime with Rate Allocation in Wireless Networks

Sushma Kumari, Parikha Chawala

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 34 | Weekly Hits: ⮙1

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Downloads: 95 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Downloads: 97 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Downloads: 97 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1536 - 1538

An Electronic Improvisation Embedded Technology in Automobiles for Run-of-Roads

Chilumula Sudheer Kumar, Ch. Kalyani

Share this Article

Downloads: 99 | Weekly Hits: ⮙2

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2603 - 2606

Object Tracking Using Joint Color-Texture Histogram

Pallavi C. Hingane, S. A. Shirsat

Share this Article

Similar Articles with Keyword 'Key Management'

Downloads: 118 | Weekly Hits: ⮙3

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 240 - 245

Key Pre Distribution for Multicast Groups using Two Server Authentication in WSN

Maddineni Ramchandra, T. Madhavi Kumari

Share this Article

Downloads: 130 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 583 - 587

Improved Key Management and Security in Dynamic Wireless Sensor Networks

Kiran.E, T. Nivethitha

Share this Article

Downloads: 138 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 3, March 2016

Pages: 426 - 428

Multiple Attribute Based Data Security in Cloud Computing ? A Review

Nitica Bir, Maninder Kaur

Share this Article

Similar Articles with Keyword 'Scalability'

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Case Studies, Electronics & Communication Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1862 - 1867

FPGA Based Architecture for High Performance SRAM Based TCAM for Search Operations

Lekshmipriya S., Suby Varghese

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2157 - 2160

Elliptical Curve Cryptography Based Hop-Hop Message Authentication

Devi Radhakrishnan

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Electronics & Communication Engineering, Sudan, Volume 6 Issue 5, May 2017

Pages: 1973 - 1975

MPLS as Backbone for Site to Site VPN Networks in VOIP Applications

Mohamed Taj Alssir A/Rahman, Dr. Hala Aldaw

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1674 - 1676

An Automatic Ballot Mechanism for Electoral Purpose

Thampula Kartheek, B. Naveen Kumar

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1718 - 1722

Optimizing the Redundancy in Wireless Networks Using Chorus

K. Aparna, P. Umapathi

Share this Article



Top