Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31105
A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

Authors: D. SuganyaDevi, G. Padmavathi


Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management is the fundamental challenge in achieving reliable secure communication using multicast key distribution for mobile adhoc networks. Thus in designing a reliable multicast key distribution scheme, reliability and congestion control over throughput are essential components. This paper proposes and evaluates the performance of an enhanced optimized multicast cluster tree algorithm with destination sequenced distance vector routing protocol to provide reliable multicast key distribution. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of key delivery ratio and packet loss rate under varying network conditions. This proposed scheme achieves reliability, while exhibiting low packet loss rate with high key delivery ratio compared with the existing scheme.

Keywords: key distribution, mobile adhoc network, Multicast and Reliability

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1367


[1] T. Chiang and Y. Huang, "Group keys and the multicast security in ad hoc networks", Proc. IEEE International Conference on Parallel Processing, IEEE press, pp 385-390, Oct 2003.
[2] T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on ad hoc networks". Proc. 1st ACM workshop on security of ad hoc and sensor networks, ACM Press, pp 94-102.2003.
[3] L. Lazos and R. Poovendram, "Energy-Aware Secure Multicast Communication in Ad Hoc Networks Using Geographical Location Information". Proc.IEEE International Conference on Acoustics Speech and Signal Processing, pp 201-204, Apr 2003.
[4] H. Bettahar, A. Bouabdallah, and M. Alkubeily, "Efficient Key Management Scheme for Secure Application level", IEEE sym. On Computers and Communications, pp 489-497, July 2007.
[5] G.Valle, R.Cardenas, "Overview the Key Management in Adhoc Networks", LCNS 3563, pp 397-406, Aug 2005.
[6] D.Huang, D.Medhi, "A Secure Group Key Management scheme for Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577, June 2008.
[7] B.Kim, H.Cho, J. Lee, "Efficient Key Distribution Protocol for secure Multicast Communication", LCNS 3043, pp 1007-1016, Apr 2004.
[8] Y. Challal, H. Seba, "Group Key Management Protocols: A novel Taxonomy", International Journal of Information Technology pp 105- 118, 2005.
[9] L. Dondeti, S. Mukherjee, and A. Samal, "Secure one-to many group communication sing dual encryption", IEEE sym. On Computers and Communications, pp 1-25, Jul 1999.
[10] H. Bettahar, A. Bouabdallah, and Y. Challal, "An adaptive key management protocol for secure multicast", Proc.IEEE International Conference on Computer Communications and Networks, pp 190- 195, Oct 2002.
[11] M. Bouassida, I. Chrisment, and O. Festor, "An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks". LCNS 3042, pp 725-742, Apr 2004.
[12] K.Rahman, R.Zaman, A.Reddy, " An Efficient DSDV routing Protocol for Wireless Mobile Adhoc Networks and its Performance Comparison", Proc. European Sym. On Computer Modeling and Simulation, pp 508- 511, Nov 2008.
[13] S. Mittra, "Iolus: A framework for scalable secure multicasting", SIGCOMM, pages 277-288, 1997.
[14] Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications", ACM SIGCOMM Computer Communication Review, pp 55-70, April 2004.
[15] M. Bouassida, I. Chrisment, and O. Festor, "Efficient Clustering for Multicast Key Distribution in MANETs", LCNS 3462, pp 138-153, May 2005.
[16] M. Bouassida, I. Chrisment, and O. Festor, "Group Key Management in Manets", International Journal of Network Security, pp 67-79, Jan 2008.
[17] M. Bouassida, I. Chrisment, and O. Festor "Efficient group key management protocol in MANETs using multipoint relaying technique", Proc.IEEE International Conference on Networking, pp 64, Apr. 2006.