2016
DOI: 10.1007/s11277-016-3366-x
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…In addition, packet dropping and packet redirecting attack are also held on the network. For securing group communication, three clustering algorithms were presented in MANET [20] as follows: (i) simple clustering algorithm, (ii) weighted clustering algorithm, and (iii) fuzzy clustering algorithm. In simple clustering algorithm, cluster formation is performed based on single metric known as connectivity.…”
Section: Survey On Security Mechanismsmentioning
confidence: 99%
“…In addition, packet dropping and packet redirecting attack are also held on the network. For securing group communication, three clustering algorithms were presented in MANET [20] as follows: (i) simple clustering algorithm, (ii) weighted clustering algorithm, and (iii) fuzzy clustering algorithm. In simple clustering algorithm, cluster formation is performed based on single metric known as connectivity.…”
Section: Survey On Security Mechanismsmentioning
confidence: 99%
“…For multiple moves, an efficient mechanism for group authentication should be considered by the GKM protocol [18]. Examples: Baal, DEP (Dual Encryption Protocol), SMKD, IGKMP (Intra Domain GKM Protocol), MARKS, HYDRA, KRONOS, etc., [24]. Some of these examples were discussed below,…”
Section: Tek Per Each Groupmentioning
confidence: 99%
“…The Two Round key agreement Protocol (TRP) was used for the purpose of intra-cluster communication. The inter cluster keys were used instead of global key for nearby cluster communication [24]. One of the most important challenge encountered by this Distributed GKM is, a) Operational inefficiency: In distributed scheme, the features of fault tolerance sacrifices its operational efficiency due to the effects of computation overhead and communication cost.…”
Section: Distributed Group Key Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…In view of the MANET's (Mobile Adhoc Network) dynamic, the proposed protocols adeptly address the dynamic events. It is designed exclusive of utilizing calculation-exhaustive pairings [22] and is extremely efficient relative to the existing hybrid cluster-based GKA protocols [20,[23][24][25][26][27][28][29].…”
mentioning
confidence: 99%