Loading

Implementation of Authenticated Group Key Management Scheme for Wireless Sensor Networks
A.V.V.S. Murthy1, P. Vasudeva Reddy2

1A.V.V.S. Murthy*, Department of Mathematics, Dr S.R.K. Govt. Arts College Yanam (U.T of Puducherry), India
2P. Vasudeva Reddy, Department of Engineering Mathematics, College of Engineering, Andhra University, Visakhapatnam. (A.P), India.
Manuscript received on January 20, 2022. | Revised Manuscript received on February 20, 2022. | Manuscript published on March 30, 2022. | PP: 77-82 | Volume-10 Issue-6, March 2022. | Retrieval Number: 100.1/ijrte.E67780110522 | DOI: 10.35940/ijrte.E6778.0310622
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The group key management technique is an important technique for cryptographic applications. In this paper, we implemented our proposed method [1] on a group key management protocol for group communication. The proposed protocol is authenticated group key distribution protocol is a mechanism for distributing a group key. We also discussed security analysis and attacks in active and passive adversary model. Also, it ensures semantic security as well as Key freshness of the group key. Along with this, they provide implicit and mutual authentication of the group key. Furthermore, the protocols provide key independence, provide Perfect Forward Secrecy and are resistant to Known Key Attack Implementation of proposed protocol in NS2 simulator. 
Keywords: Key Management, Group Key Management, Digital Short Signatures, Authentication, Wireless sensor networks.
Scope of the Article: Network Operations & Management