LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

MANET Security Betterment by Enhanced Multiple Key Management Scheme

Photo by lensingmyworld from unsplash

Creating and accessing multiple groups with various validations in Mobile Ad hoc Networks (MANET) is getting popular these days. Providing privacy as well as accessibility at the same time is… Click to show full abstract

Creating and accessing multiple groups with various validations in Mobile Ad hoc Networks (MANET) is getting popular these days. Providing privacy as well as accessibility at the same time is a challenging process because the MANET nodes are highly random and independent characteristics. Several researchers have been proposed different Key Management Schemes to serve these purposes. The prime objective and common goal of these schemes is to ensure a secured communication in an Ad hoc Network, which is complicated one because of its dynamic nature and the lack of Centralized Management. The fully-distributed ID-based Multiple Secret Key Management Scheme (IMKM) was proposed to provide secured communication. This research work has implemented the IMKM and thoroughly studied. From the experimental results, we observed that IMKM was performing well and it is eliminating the requirement of certificate-based authenticated public key distribution. This is also suitable for Key Update and Key Abrogation. IMKM can be significantly improved to reduce the Procedure Complexity, Processing Overhead, Power Consumption, the Key Size and Group Key Generation, which could not be achieved through the existing IMKM. To overcome above problems, we enhanced IMKM by introducing Elliptic Curve Technique based Key Exchange Procedure, which is known as Enhanced Multiple Key Management Scheme (EIMKM). This improved EIMKM Scheme is implemented and analyzed the performances. From our experimental results, we conclude that the proposed EIMKM Key Management Scheme has achieved higher performance in terms of Robustness, Mobility, Computational Overhead, Message Overhead, Security Strength, Key Exchange Time, Power Consumption and Key Update Time.

Keywords: management scheme; enhanced multiple; management; key management; multiple key

Journal Title: Wireless Personal Communications
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.