International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 3 | Year 2012 | Article Id. IJCTT-V3I3P102 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I3P102

Secure Transmission Services in Wireless Networks using Key Trees


Geddam.Kiran Kumar ,Prof K .V. Mutyalu

Citation :

Geddam.Kiran Kumar ,Prof K .V. Mutyalu, "Secure Transmission Services in Wireless Networks using Key Trees," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 3, pp. 317-324, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I3P102

Abstract

In contrast with conventional networks, mobile networks usually do not provide on-line access to trusted authorities or to centralized servers for secure message transmissions and exhibit problems like frequent problems due to link-node failures and pricey issues. For these reasons, existing solutions for secure message transmission services in regular networks require on-line trusted authorities or certificate repositories that are not well suited for securing mobile networks. To reduce computation overhead the core system is deployed at a Server and accessed via mobile nodes. In this paper, we propose a fully self-organized public-key management system that allows users to generate their key message pairs and cipher/decipher them(using RSA encryption), to issue access, to perform authentication regardless of the network partitions and number of users using Key Tree management schemes.

Keywords

Wireless broadcast, key management, access control, key hierarchy, secure group communication, key distribution.

References

[1] Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: a survey. Comput. Netw. 2002, 38, 393-422.
[2] Camtepe, S.A.; Yener, B. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey; Technical Report TR-05-07; Department of Computer Science, Rensselaer Polytechnic Institute: Troy, NY, USA, March 2005. International Journal of Computer Trends and Technology- volume3Issue3- 2012
[3] J. Snoeyink, S. Suri, and G. Varghese, “A Lower Bound forMulticast Key Distribution,” Proc. IEEE INFOCOM ’01, vol. 1.
[4] LeinHarn and ChangluLin “Authenticated Group Key Transfer Protocol Based On SecretSharing “ IEEE Transactions On Computers, Vol. 59, No. 6, June 2010
[5] Xingyu Li and H,Vicky Zhao “An Efficient Key Management Scheme For Live Streaming” IEEE Communications Society,IEEE "Globecom" 2009.
[6] Ohtake,Goichiro Hanaoka, and Kazuto Ogawa “An Efficient Provider Authentication ForBidirectional Broadcasting Service” IEEE Transactions On Broadcasting,January2009.
[7] Xiaoguang Niu , Yanmin Zhu , Li Cui , Lionel M. Ni “FKM: A Fingerprint-based KeyManagement Protocol for SoC-based Sensor Networks”IEEE Communications Society, IEEE 2009.
[8] Xukai Zou Elisa Berti Yuan-Shun Dai “A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing” IEEE Communications Society, IEEE "Globecom" 2009.
[9] Reusable Key Management Technique for Secured Wireless Computer Communication S.Afrin Banu Anna University Tirunelveli. Nagercoil-3, K.K Dist Tamilnadu,India.