International Journal of Scientific Research in Network Security and Communication

  • Year: 2021
  • Volume: 9
  • Issue: 2

An efficient and secure ID based asymmetric key management scheme for dynamic groups

  • Author:
  • M. Sandhya Rani1,*, R. Rekha2, K.V.N Sunitha3
  • Total Page Count: 4
  • DOI:
  • Page Number: 1 to 4

1Dept. of Information Technology, Bhoj Reddy Engineering College for Women, JNTUH, Hyderabad, India

2Dept. of Computers and Informatics, University College of Engineering & Technology, MGU, Nalgonda, India

3Dept. of Computer Science & Engineering, BVRIT HYDERABAD College of Engineering for Women, JNTUH, Hyderabad, India

Abstract

A Group Key Agreement (GKA) protocol in Mobile Adhoc Networks (MANETS)permits a group of users to share a common secret using wireless links. Due to the advancement of technology, GKA poses a major challenge to provide authentication & confidentiality in open networks. This paper provides the diversified details of distributed group key management protocols from centralized group key management protocols and traditional symmetric group key agreement from asymmetric group key agreement protocols. In asymmetric group key management protocols, only a group encryption key is negotiated, and decryption key is kept secret at each user. In our proposed ID-based Asymmetric distributed group key agreement protocol, Chinese Remainder Theorem is used for computing Group Encryption Key and RSA algorithm is used for generating public and private keys for each member. The main advantage of our protocol is that it decreases the computation overhead of the members with respect to group dynamics and provides secure multicast communication in MANETs in comparison with other existing schemes.

Keywords

Group Key, Computation, Communication, Key Management