INTERNATIONAL RESEARCH JOURNAL OF SCIENCE ENGINEERING AND TECHNOLOGY

( Online- ISSN 2454 -3195 ) New DOI : 10.32804/RJSET

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 81    Submit Your Rating     Cite This   Download        Certificate

SECRET KEY SHARING BASED ON AUTHENTICATED GROUP KEY TRANSFER PROTOCOL

    3 Author(s):  ANNA SUGANTHI.S , KARNAVEL.K , RAJINI GIRINATH.D

Vol -  5, Issue- 1 ,         Page(s) : 10 - 20  (2015 ) DOI : https://doi.org/10.32804/RJSET

Abstract

Abstract -Group communication is becoming the basis for a growing number of applications. Group communication can benefit from a Key Generation Center to achieve a scalable exchange of messages. Key Generation Center can broadcast group key information to all group members at once under the secret shared with each user during registration and sends the cipher text to each group member separately. Key transfer protocols rely on a mutually trusted key generation center(KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key; but unauthorized users cannot recover the group key. The confidentiality of this transformation is information theoretically secure the strength of the proposed protocol is authentication and confidentiality. Security goals and analysis against inside and outside attacks can be achieved. . We also provide authentication for transporting this group key. Goals and security threats of our proposed group key transfer protocol will be analyzed in detail.

  1. I.F. Akyildiz and I.H. Kasimoglu, “Wireless Sensor and Actor Networks: Research Challenges,” Elsevier Ad Hoc Network J., vol. 2, pp. 351-367, 2004. 
  2. K. Akkaya and M. Younis, “Coverage-Aware and Connectivity- Constrained Actor Positioning in Wireless Sensor and Actor Networks,”  Proc. 26th IEEE Int’l Performance Computing and Comm. Conf. (IPCCC ’07), Apr. 2007. 
  3. K. Ozaki et al., “A Fault-Tolerant Model for Wireless Sensor-Actor  System,” Proc. Second IEEE Int’l Workshop Heterogeneous Wireless Sensor Networks (HWISE ’06), Apr. 2006. 
  4. P. Basu and J. Redi, “Movement Control Algorithms for Realization of Fault-Tolerant Ad Hoc Robot Networks,” IEEE Networks, vol. 18, no.  4, pp. 36-44, Aug. 2004. 
  5. K. Akkaya, M. Younis, and M. Bangad, “Sink Repositioning for Enhanced Performance in Wireless Sensor Networks,” Computer Networks, vol. 49, pp. 434-512, 2005. 
  6. X. Liu, L. Xiao, A. Kreling, and Y. Liu, “Optimizing Overlay Topology by Reducing Cut Vertices,” Proc. ACM Int’l Workshop Network and Operating System Support for Digital Audio and Video (NOSSDAV ’06), May 2006. 
  7. K. Akkaya et al., “Distributed Recovery of Actor Failures in Wireless Sensor and Actor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’08), Mar. 2008. 

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details