International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 106 | Views: 163

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna | K. V. Srinivasa Rao [3]

Abstract: The difficulty of effectively and securely broadcasting to a remote cooperative group happens in many freshly appearing networks. A foremost dispute in developing such systems is to over whelm the obstacles of the potentially restricted connection from the assembly to the sender, the unavailability of a completely trusted key generation center, and the dynamics of the sender. The novel, living key administration paradigms cannot deal with these trials effectively. In this paper, we circumvent these obstacles and close this gap by suggesting a innovative key administration paradigm. The new paradigm is a hybrid of customary broadcast encryption and assembly key agreement. In such a scheme, each constituent sustains a single public/secret key two. Upon seeing the public keys of the members, a isolated sender can securely broadcast to any proposed subgroup selected in an publicity hoc way. Following this form, we instantiate a scheme that is verified protected in the standard form. Even if all the no proposed constituents collude, they will not extract any helpful data from the conveyed messages. After the public assembly encryption key is extracted, both the computation overhead and the connection cost are independent of the group dimensions. Furthermore, our scheme facilitates easy yet efficient member deletion/addition and flexible rekeying schemes. Its powerful security against collusion, its unchanging overhead, and its implementation friendliness without relying on a fully trusted administration render our protocol a very under taking solution to many applications.

Keywords: Ad hoc networks, broadcast, cooperative computing, access control, information security, key management

Edition: Volume 3 Issue 10, October 2014,

Pages: 781 - 785

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait