Abstract
Handling Keys in the distributed wireless network is one of the most popular options that ensures the protection of data that are transmitted under various circumstances. It even assists the setting up, reversal and the looking after of keys across diverse. So this makes it requisite to process and produce a corporate key that is secret and as well as distribute it across the network that is decentralized. This sort of key is termed as the shared key. The shared key aids in the procedures of encrypting and decrypting the information's that are to be transmitted. Multitudes of applications are developed based on the decentralized wireless network such as wireless adhoc network, mobile adhoc networks, wireless sensor networks etc. are suggested with the secret key protection to enhance the security level while transmitting data. The shared key transfer protocol (SKTP) procedure accomplishes encryption /decryption for the message to be transferred it uses a group of key and shares them across a several transmissions that takes place across the head of the cluster and the nodes in the clustered paradigm. This shared collection of keys allows the consumer to encode and decode the message that is to be conveyed for all the consumers in a group enabling a member in the cluster to work together with the other member in the group around the data discovery. So the paper aims in establishing a novel shared key transfer protocol (N-SKTP) that is dynamic in nature and practically possible to secure the information transfer across the devices in the distributed wireless network. The N-SKTP utilizes the pubic key cryptography to develop a shared key group (SKG) for the manifold transmission in the network. The investigation of the performance of the proposed protocol using the network simulator -2 experimentally demonstrates the proficiency of the N-SKTP in the distributed wireless networks with limited resources.
References
Balachandran, Ravi K., Byrav Ramamurthy, Xukai Zou, and N. Variyam Vinodchandran. "CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks." In IEEE International Conference on Communications, 2005. ICC 2005. 2005, vol. 2, pp. 1123-1127. IEEE, 2005.
Zhu, Sencun, Sanjeev Setia, Shouhuai Xu, and Sushil Jajodia. "GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks." Journal of Computer Security 14, no. 4 (2006): 301-325.
Rahman, Rony Hasinur, and M. Lutfar Rahman. "An efficient group key agreement protocol for ad-hoc networks." In 2008 International Conference on Electrical and Computer Engineering, pp. 478-483. IEEE, 2008.
Mukherjee, Anindo, Anurag Gupta, and Dharma P. Agrawal. "Distributed key management for dynamic groups in MANETs." Pervasive and Mobile Computing 4, no. 4 (2008): 562-578.
Li, Xiang-Yang, Yu Wang, and Ophir Frieder. "Efficient hybrid key agreement protocol for wireless ad hoc networks." In Proceedings. Eleventh International Conference on Computer Communications and Networks, pp. 404-409. IEEE, 2002.
Cho, Jin-Hee, Ray Chen, and Ding-Chau Wang. "Performance optimization of region-based group key management in mobile ad hoc networks." Performance Evaluation 65, no. 5 (2008): 319-344.
Drira, Kaouther, Hamida Seba, and Hamamache Kheddouci. "ECGK: An efficient clustering scheme for group key management in MANETs." Computer Communications 33, no. 9 (2010): 1094-1107.
Bellazreg, Ramzi, and Noureddine Boudriga. "DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2014, no. 1 (2014): 9.
Yang, Yang, Yupu Hu, Chun-hui Sun, Chao Lv, and Leyou Zhang. "An efficient group key agreement scheme for mobile ad-hoc networks." Int. Arab J. Inf. Technol. 10, no. 1 (2013): 10-17.
Praveena, A., and S. Smys. "Efficient cryptographic approach for data security in wireless sensor networks using MES VU." In 2016 10th international conference on intelligent systems and control (ISCO), pp. 1-6. IEEE, 2016.
Suma, V. (2019). Security and Privacy Mechanism Using Blockchain. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 1(01), 45-54.
Sridhar, S., and S. Smys. "Intelligent security framework for iot devices cryptography based end-to-end security architecture." In 2017 International Conference on Inventive Systems and Control (ICISC), pp. 1-5. IEEE, 2017
. Mugunthan, S. R. (2019). Security And Privacy Preserving Of Sensor Data Localization Based On Internet Of Things. Journal of Ismac, 1(02) 81-92.
Kumar, Dinesh, S. Smys, G. Smilarubavathy, and Frank Holzwarth. "Fault Detection Methodology in Wireless Sensor Network." In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference on, pp. 723-728. IEEE, 2018.
