Secure Transmission Services in Wireless Networks using Key Trees

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-3                           
Year of Publication : 2012
Authors :Geddam.Kiran Kumar ,Prof K .V. Mutyalu

MLA

Geddam.Kiran Kumar ,Prof K .V. Mutyalu."Secure Transmission Services in Wireless Networks using Key Trees"International Journal of Computer Trends and Technology (IJCTT),V3(3):317-324 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks require on-line trusted authorities or certificate repositories that are not well suited for securing mobile networks. To reduce computation overhead the core system is deployed at a Server and accessed via mobile nodes. In this paper, we propose a fully self-organized public-key management system that allows users to generate their key message pairs and cipher/decipher them(using RSA encryption), to issue access, to perform authentication regardless of the network partitions and number of users using Key Tree management schemes.

References-

[1] Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: a survey. Comput. Netw. 2002, 38, 393-422.
[2] Camtepe, S.A.; Yener, B. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey; Technical Report TR-05-07; Department of Computer Science, Rensselaer Polytechnic Institute: Troy, NY, USA, March 2005. International Journal of Computer Trends and Technology- volume3Issue3- 2012
[3] J. Snoeyink, S. Suri, and G. Varghese, “A Lower Bound forMulticast Key Distribution,” Proc. IEEE INFOCOM ’01, vol. 1.
[4] LeinHarn and ChangluLin “Authenticated Group Key Transfer Protocol Based On SecretSharing “ IEEE Transactions On Computers, Vol. 59, No. 6, June 2010
[5] Xingyu Li and H,Vicky Zhao “An Efficient Key Management Scheme For Live Streaming” IEEE Communications Society,IEEE "Globecom" 2009.
[6] Ohtake,Goichiro Hanaoka, and Kazuto Ogawa “An Efficient Provider Authentication ForBidirectional Broadcasting Service” IEEE Transactions On Broadcasting,January2009.
[7] Xiaoguang Niu , Yanmin Zhu , Li Cui , Lionel M. Ni “FKM: A Fingerprint-based KeyManagement Protocol for SoC-based Sensor Networks”IEEE Communications Society, IEEE 2009.
[8] Xukai Zou Elisa Berti Yuan-Shun Dai “A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing” IEEE Communications Society, IEEE "Globecom" 2009.
[9] Reusable Key Management Technique for Secured Wireless Computer Communication S.Afrin Banu Anna University Tirunelveli. Nagercoil-3, K.K Dist Tamilnadu,India. This email address is being protected from spambots. You need JavaScript enabled to view it..

KeywordsWireless broadcast, key management, access control, key hierarchy, secure group communication, key distribution.