Journal of Computer Science

Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

E. Mohanraj and K. Duraiswamy

DOI : 10.3844/jcssp.2012.1711.1717

Journal of Computer Science

Volume 8, Issue 10

Pages 1711-1717

Abstract

Problem statement: A mobile ad-hoc network (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless links. In MANET, there is a possibility of packet data to get lost or hacked by an attacker. So, to improve a secure communication over MANET from attackers, several techniques have been developed. The previous work developed to provide an efficient communication in Mobile Ad Hoc Networks by adapting an optimization technique of Ant Colony Optimization with Fairness Index and provides an authentication services to data. But the drawback is that there is a possible for the authorized user in MANET can access the unauthorized data and the authentication services for data are used only to defend communication on clear mediums in wireless networks. Approach: To improve the secure data communication in MANET, in this work we present a routing based data security by using multicast group key management. The proposed work routing based data security describes the process of secure the data while on communication through a specified route using group key management. Results: The group key management efficiently manages the data communication in MANET using key derivative function. A Key Derivation Function (or KDF) used to derive a secret key formed by a secure group on MANET. Conclusion: An experimental evaluation show that the proposed routing based data security by using multicast group key management outperforms well in terms of key maintenance, communication overhead, security.

Copyright

© 2012 E. Mohanraj and K. Duraiswamy. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.