Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

HGKM: : An Efficient Hybrid Group Key Management for Unmanned Autonomous Vehicles MBN in Wireless Network Environment

Published: 01 January 2022 Publication History

Abstract

Mobile ad hoc networks (MANET) have been seen as a related advancement to Group Key Management (GKM) applications. Remembering the true objective to guarantee amass applications and disallow uncertified clients from getting to the correspondence data that cannot be anchored by a remote MANET, including IP multicast, the singular gathered data content must remain encoded by a typical shared gathering key. Key administration is required to anchor the assurance of gathering the key and to safeguard those gathering data. GKM framework is associated with the remote system condition partners with three issues: execution, security, and system versatility. This article focuses on the Unmanned Aerial Vehicle (UAV)-mobile backbone node (MBN) remote system performance. The UAV-MBN Network condition is a military system that includes a proposal to group an important administrative structure. A half-and-half gathering key administration technique, which works on each target of UAV-MBN, is included in an arrangement to start two basic remote gathering key administration difficulties: (1) operational performance and (2) multiple-enrollment development. By working with minimal small-scale key administration, this strategy can diminish the execution cost associated with the key administration along with the increment operational execution of remote GKM. Scaled-down key organization is carried out in the context of these movement units. The key administration approach also restricted the operational procedure and decreased the operation’s cost in terms of key generation, figuring, and associated correspondence. Overall, the HGKM strategy that has been introduced enhances the operational process and functions effectively in reasonable remote areas.

References

[1]
M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 31–37, 1996, January.
[2]
A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444–458, 2003.
[3]
R. Mahaveerakannan and C. Suresh Gnana Dhas, “Big data analytics for large-scale UAV-MBN in quantum networks using efficient hybrid GKM, Concurrency and Computation:” Practice and Experience, vol. 34, no. 1, 2019.
[4]
A. Irshad, H. F. Ahmad, B. A. Alzahrani, M. Sher, and S. A. Chaudhry, “An efficient and anonymous chaotic map based authenticated key agreement for multi-server architecture,” KSII Transactions on Internet and Information Systems (TIIS), vol. 10, no. 12, pp. 5572–5595, 2016.
[5]
M. Sumathi and S. Sangeetha, “A group-key-based sensitive attribute protection in cloud storage using modified random fibonacci cryptography,” Complex & Intelligent Systems, vol. 7, pp. 1733–1747, 2020.
[6]
M. A. Haq, “Optimal cluster head selection for energy efficient wireless sensor network using hybrid competitive swarm optimization and harmony search algorithm,” Sustainable Energy Technologies and Assessments, vol. 52, no. 102243, pp. 1–5, 2022.
[7]
J. Bhola, M. Shabaz, G. Dhiman, S. Vimal, P. Subbulakshmi, and S. K. Soni, “Performance evaluation of multilayer clustering network using distributed energy efficient clustering with enhanced threshold protocol,” Wireless Personal Communications, 2021.
[8]
C. K. Wong, M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” ACM SIGCOMM - Computer Communication Review, vol. 28, no. 4, pp. 68–79, 1998.
[9]
A. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, “Security enhancement in MANET authentication by checking the CRL status of servers,” Int J Adv Sci Technol, vol. 1, pp. 91–98, 2008.
[10]
C. J. Mitchell, “Security issues in a group key establishment protocol,” The Computer Journal, vol. 62, no. 3, pp. 373–376, 2018.
[11]
R. Di Pietro, L. V. Mancini, and S. Jajodia, “Providing secrecy in key management protocols for large wireless sensors networks,” Ad Hoc Networks, vol. 1, no. 4, pp. 455–468, 2003.
[12]
D. Bhargava, B. Prasanalakshmi, T. Vaiyapuri, H. Alsulami, S. H. Serbaya, and A. W. Rahmani, “CUCKOO-ANN based novel energy-efficient optimization technique for IoT sensor node modelling,” Wireless Communications and Mobile Computing, vol. 2022, 9 pages, 2022.
[13]
I. Rubin and P. Vincent, “Topological synthesis of mobile backbone networks for managing ad hoc wireless networks,” in Proceedings of the IFIP/IEEE International Conference on Management of Multimedia Networks and Services, pp. 215–221, Springer, Berlin, Heidelberg, 2001, October.
[14]
D. Chen, D.-Z. Du, X.-D. Hu, G.-H. Lin, L. Wang, and G. Xue, “Approximations for Steiner trees with minimum number of Steiner points,” Journal of Global Optimization, vol. 18, no. 1, pp. 17–33, 2000.
[15]
C. K. Wong, M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16–30, 2000.
[16]
M. Steiner, G. Tsudik, and M. Waidner, “Key agreement in dynamic peer groups,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769–780, 2000.
[17]
S. Rafaeli and D. Hutchison, “A survey of key management for secure group communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309–329, 2003.
[18]
Y. Kim, A. Perrig, and G. Tsudik, “Communication-efficient group key agreement,” in Proceedings of the IFIP International Information Security Conference, pp. 229–244, Springer, Boston, MA, 2001, June.
[19]
R. Mohan Naik and S. V. Sathyanarayana, “Key management infrastructure in cloud computing environment-a survey,” ACCENTS Transactions on Information Security, vol. 2, no. 7, pp. 52–61, 2017.
[20]
R. K. Garg, J. Bhola, and S. K. Soni, “Healthcare monitoring of mountaineers by low power Wireless Sensor Networks,” Informatics in Medicine Unlocked, vol. 27, 2021.
[21]
S. Iqbal, M. L. Mat Kiah, A. Ur Rehman, Z. Abbas, and B. Daghighi, “DM-GKM: A key management scheme for dynamic group based applications,” Computer Networks, vol. 182, 2020.
[22]
M. A. Haq, “Development of PCCNN-based network intrusion detection system for EDGE computing,” Computers, Materials & Continua, vol. 71, no. 1, pp. 1729–1750, 2021.
[23]
Y. Kim, A. Perrig, and G. Tsudik, “Group key agreement efficient in communication,” IEEE Transactions on Computers, vol. 53, no. 7, pp. 905–921, 2004.
[24]
Y. Kim, A. Perrig, and G. Tsudik, “Tree-based group key agreement,” ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60–96, 2004.
[25]
Y. Sun, W. Trappe, and K. R. Liu, “A scalable multicast key management scheme for heterogeneous wireless networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 4, pp. 653–666, 2004.
[26]
H. Kim, B. Chung, Y. Lee, Y. Park, and H. Yoon, “Weakness of the synchro-difference lkh scheme for secure multicast,” IEEE Communications Letters, vol. 11, no. 9, pp. 765–767, 2007.
[27]
M. H. Park, Y. H. Park, H. Y. Jeong, and S. W. Seo, “Key management for multiple multicast groups in wireless networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 9, pp. 1712–1723, 2012.
[28]
T. T. Mapoka, S. J. Shepherd, and R. A. Abd-Alhameed, “A new multiple service key management scheme for secure wireless mobile multicast,” IEEE Transactions on Mobile Computing, vol. 14, no. 8, pp. 1545–1559, 2014.
[29]
R. Mahaveerakannan and C. Suresh Gnana Dhas, “A hybrid group key management scheme for uav–mbn network environment increasing efficiency of key distribution in joining operation,” in Proceedings of the International Conference on Intelligent Information Technologies, pp. 93–107, Springer, Singapore, 2017, December.
[30]
R. Droms, Dynamic Host Configuration Protocol, vol. 2131, Network Working Group - RFC, March 1997.

Cited By

View all

Index Terms

  1. HGKM: An Efficient Hybrid Group Key Management for Unmanned Autonomous Vehicles MBN in Wireless Network Environment
          Index terms have been assigned to the content through auto-classification.

          Comments

          Information & Contributors

          Information

          Published In

          cover image Security and Communication Networks
          Security and Communication Networks  Volume 2022, Issue
          2022
          13851 pages
          ISSN:1939-0114
          EISSN:1939-0122
          Issue’s Table of Contents
          This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

          Publisher

          John Wiley & Sons, Inc.

          United States

          Publication History

          Published: 01 January 2022

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 10 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media