Secure Transmission Services in Wireless Networks using Key Trees
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2012 by IJCTT Journal|
|Volume-3 Issue-3 |
|Year of Publication : 2012|
|Authors :Geddam.Kiran Kumar ,Prof K .V. Mutyalu|
Geddam.Kiran Kumar ,Prof K .V. Mutyalu."Secure Transmission Services in Wireless Networks using Key Trees"International Journal of Computer Trends and Technology (IJCTT),V3(3):317-324 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks require on-line trusted authorities or certificate repositories that are not well suited for securing mobile networks. To reduce computation overhead the core system is deployed at a Server and accessed via mobile nodes. In this paper, we propose a fully self-organized public-key management system that allows users to generate their key message pairs and cipher/decipher them(using RSA encryption), to issue access, to perform authentication regardless of the network partitions and number of users using Key Tree management schemes.
 Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: a survey. Comput. Netw. 2002, 38, 393-422.
 Camtepe, S.A.; Yener, B. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey; Technical Report TR-05-07; Department of Computer Science, Rensselaer Polytechnic Institute: Troy, NY, USA, March 2005. International Journal of Computer Trends and Technology- volume3Issue3- 2012
 J. Snoeyink, S. Suri, and G. Varghese, “A Lower Bound forMulticast Key Distribution,” Proc. IEEE INFOCOM ’01, vol. 1.
 LeinHarn and ChangluLin “Authenticated Group Key Transfer Protocol Based On SecretSharing “ IEEE Transactions On Computers, Vol. 59, No. 6, June 2010
 Xingyu Li and H,Vicky Zhao “An Efficient Key Management Scheme For Live Streaming” IEEE Communications Society,IEEE "Globecom" 2009.
 Ohtake,Goichiro Hanaoka, and Kazuto Ogawa “An Efficient Provider Authentication ForBidirectional Broadcasting Service” IEEE Transactions On Broadcasting,January2009.
 Xiaoguang Niu , Yanmin Zhu , Li Cui , Lionel M. Ni “FKM: A Fingerprint-based KeyManagement Protocol for SoC-based Sensor Networks”IEEE Communications Society, IEEE 2009.
 Xukai Zou Elisa Berti Yuan-Shun Dai “A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing” IEEE Communications Society, IEEE "Globecom" 2009.
KeywordsWireless broadcast, key management, access control, key hierarchy, secure group communication, key distribution.