Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 801632, 10 pages
http://dx.doi.org/10.1155/2015/801632
Research Article

Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

1Department of Computer Science, Er.Perumal Manimekalai College of Engineering, Hosur 635117, India
2Er.Perumal Manimekalai College of Engineering, Hosur 635117, India
3Department of Information Technology, KSR College of Technology, Tiruchengode 637211, India

Received 12 September 2014; Accepted 1 January 2015

Academic Editor: Hai Jiang

Copyright © 2015 B. Madhusudhanan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Junhai, X. Liu, and Y. Danxia, “Research on multicast routing protocols for mobile Ad-hoc networks,” Computer Networks, vol. 52, no. 5, pp. 988–997, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Striki and J. S. Baras, “Key distribution protocols for secure multicast communication survivable in MANETs,” in Proceedings of the IEEE Military Communications Conference (MILCOM '03), Boston, Mass, USA, October 2003.
  3. C. Rajan and N. S. Shanthi, “Misbehaving attack mitigation technique for multicast security in mobile ad hoc networks (MANET),” Journal of Theoretical and Applied Information Technology, vol. 48, no. 3, pp. 1349–1357, 2013. View at Google Scholar · View at Scopus
  4. R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, and R. Dharmaraj, “Secure group key management scheme for multicast networks,” International Journal of Network Security, vol. 10, no. 3, pp. 205–209, 2010. View at Google Scholar
  5. L. Lazos and R. Poovendran, “Power proximity based key management for secure multicast in Ad hoc networks,” Wireless Networks, vol. 13, no. 1, pp. 127–148, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. D. S. Devi and G. Padmavathi, “A reliable secure multicast key distribution scheme for mobile Adhoc networks,” World Academy of Science, Engineering and Technology, vol. 56, pp. 321–326, 2009. View at Google Scholar
  7. S. Devaraju and G. Padmavathi, “Dynamic clustering for QoS based secure multicast key distribution in mobile Ad hoc networks,” International Journal of Computer Science Issues, vol. 7, no. 5, pp. 30–37, 2010. View at Google Scholar
  8. B.-J. Chang and S.-L. Kuo, “Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs,” IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 1846–1863, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Huang and D. Medhi, “A secure group key management scheme for hierarchical mobile Ad hoc networks,” Ad Hoc Networks, vol. 6, no. 4, pp. 560–577, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. M. S. Bouassida and M. Bouali, “On the performance of group key management protocols in MANETs,” in Proceedings of the Joint Conference on Security in Network Architectures and Information Systems (SAR-SSI '07), pp. 275–286, Annecy, France, June 2007.
  11. J.-C. Lin, K.-H. Huang, F. Lai, and H.-C. Lee, “Secure and efficient group key management with shared key derivation,” Computer Standards & Interfaces, vol. 31, no. 1, pp. 192–208, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. V. Sridhara and S. Bohacek, “Realistic propagation simulation of urban mesh networks,” Computer Networks, vol. 51, no. 12, pp. 3392–3412, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Biradar, S. Manvi, and M. Reddy, “Mesh based multicast routing in MANET: stable link based approach,” International Journal of Computer and Electrical Engineering, vol. 2, no. 2, pp. 371–380, 2010. View at Google Scholar
  14. S. R. Zakhary and M. Radenkovic, “Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments,” in Proceedings of the 7th International Conference on Wireless On-Demand Network Systems and Services (WONS '10), pp. 161–167, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. Elliptic Curve Cryptography, Version 2.0, Technical Guideline, Bundesamt für Sicherheit in der Informationstechnik, 2012.
  16. H.-Y. Lin and T.-C. Chiang, “Efficient key agreements in dynamic multicast height balanced tree for secure multicast communications in Ad Hoc networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2011, Article ID 382701, 15 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. Network Simulator, http://www.isi.edu/nsnam/ns/.
  18. K. Drira, H. Seba, and H. Kheddouci, “ECGK: an efficient clustering scheme for group key management in MANETs,” Computer Communications, vol. 33, no. 9, pp. 1094–1107, 2010. View at Publisher · View at Google Scholar · View at Scopus