Implementation of Authenticated Group Key Management Scheme for Wireless Sensor Networks
Open Access
- 30 March 2022
- journal article
- Published by Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP in International Journal of Recent Technology and Engineering (IJRTE)
- Vol. 10 (6), 77-82
- https://doi.org/10.35940/ijrte.e6778.0310622
Abstract
The group key management technique is an important technique for cryptographic applications. In this paper, we implemented our proposed method [1] on a group key management protocol for group communication. The proposed protocol is authenticated group key distribution protocol is a mechanism for distributing a group key. We also discussed security analysis and attacks in active and passive adversary model. Also, it ensures semantic security as well as Key freshness of the group key. Along with this, they provide implicit and mutual authentication of the group key. Furthermore, the protocols provide key independence, provide Perfect Forward Secrecy and are resistant to Known Key Attack Implementation of proposed protocol in NS2 simulator.Keywords
This publication has 17 references indexed in Scilit:
- DynTunKey: a dynamic distributed group key tunneling management protocol for heterogeneous wireless sensor networksEURASIP Journal on Wireless Communications and Networking, 2014
- A New Secure Authenticated Group Key Transfer ProtocolWireless Personal Communications, 2013
- On the Security of an Authenticated Group Key Transfer Protocol Based on Secret SharingLecture Notes in Computer Science, 2013
- Group key agreement for secure group communication in dynamic peer systemsJournal of Parallel and Distributed Computing, 2012
- An authenticated group key distribution protocol based on the generalized Chinese remainder theoremInternational Journal of Communication Systems, 2012
- ECGK: An efficient clustering scheme for group key management in MANETsComputer Communications, 2010
- An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledgeComputer Communications, 2009
- A survey of key management for secure group communicationACM Computing Surveys, 2003
- Secure broadcasting using the secure lockIEEE Transactions on Software Engineering, 1989
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985