Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Security Services in Group Communications over Mobile Ad-Hoc and Wireless Sensor Networks Using Performance Analysis of Algorithms  
  Authors : Ramkumar Ramaswamy
  Cite as:

 

Group communications in wireless networks has been facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers.. Due to insecure wireless channels, group communications are susceptible to various kinds of attacks. Although a number of proposals have been reported to secure group communications using Group management key (GMK), provisioning security in group communications in wireless networks remains a critical and challenging issue. This article presents a survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group communications in these networks: wireless infrastructure networks, mobile ad hoc networks, and wireless sensor networks. This article presents a survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group communications in these networks: wireless infrastructure networks, mobile ad hoc networks, and wireless sensor networks.

 

Published In : IJCSN Journal Volume 6, Issue 4

Date of Publication : August 2017

Pages : 495-500

Figures :04

Tables : 01

 

Ramkumar Ramaswamy : Department of Computer science and Information Technology, DMI-St. John the Baptist University, Mangochi, The Republic of Malawi.

 

WSN, Security Service

Nowadays, most of the network system is established in the mobile environments. Every mobile ad hoc system should be accessed with the better performance. In this proposed system “Distributed Token Ring circulation in mobile Ad-hoc Networks”, to measure the performance of the local and global connectivity between the nodes. An important application of such algorithms is to ensure total order of message delivery in a group communication service. If the algorithms are gives different performance results for each group in the ad hoc network topology. When using a token circulation algorithm, a round is said to complete when every node has been visited at least once. Criteria for comparing the algorithms include the average time required to complete a round, number of bytes sent per round, and number of nodes visited per round.

 

[1] S. K. S. Gupta and S. Cherukuri, “An Adaptive Protocol for Efficient and Secure Multicasting in IEEE 802.11 Based Wireless LANs,” Proc. IEEE WCNC 2003, vol. 3, Mar. 2003, pp. 2021–26. [2] A. Wadaa et al., “On Providing Anonymity in Wireless Sensor Networks,” Proc. 10th Int’l. Conf. Parallel and Distrib. Syst., July 2004, pp. 411–18. [3] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Elsevier’s Ad Hoc Networks J., Special ssueI on Sensor Network Applications Protocols, vol. 1, no. 2–3, Sep. 2002, pp. 293–315. [4] R. Maheshwari, J. Gao, and S. R. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” Proc. IEEE INFOCOM ’07, Mar.2007. [5] B. Decleene et al., “Secure Group Communications for Wireless Networks,” Proc. IEEE MILCOM 2001, vol. 1, Oct. 2001, pp. 113–17. [6] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Communication Security, Oct. 2003, pp. 62-72. [7] Z. Yu and Y. Guan, “A Robust Group-Based Key Management Scheme for Wireless Sensor Networks,” Proc. IEEE WCNC ’05, vol. 4, Mar. 2005, pp. 1915– 20. [8] W. Zhang and G. Cao, “Group Rekeying for Filtering False Data in Sensor Networks: a Predistribution and Local Collaboration-Based Approach,” Proc. IEEE INFOCOM ’05, vol. 1, Mar. 2005, pp. 503–14. [9] M. Striki and J. Baras, “Towards Integrating Key Distribution with Entity Authentication for Efficient, Scalable and Secure Group Communication in MANETs,” Proc.IEEE ICC ’04, vol. 7, June 2004, pp. 4377–81. [10] R. K. Balachandran et al., “CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad Hoc Networks,” Proc. IEEE ICC ’05, vol. 2, May 2005, pp. 1123–27.