Abstract
The purpose of this paper is to present an outlier detection mechanism for hierarchical key management which utilizes hybrid (public and private) key management scheme for implementing lightweight cryptographic primitives in hierarchical MANETs. Further, a comparative analysis of key management schemes is to be performed for identifying an efficient key management scheme for hierarchical MANETs. In key management methods, public and private group key management schemes are integrated at local level (subgroup) and global level (network). These key management schemes uses various topologies for minimizing communicational and computational costs. After implementing an efficient key management scheme, outliers in network are identified using packet analysis at key generation, key distribution, message transmission and key re-generation phases. It is observed that Teo and Tan key management approach with shamir’s threshold key distribution mechanism is an efficient approach key management scheme for group authentication and hierarchical key management. Further, a minimum improvement of 9.7% and 0.91%, and maximum improvements of 25.3% and 87.7% are observed for Packet Delivery Rate (APDR) and Average Throughput (AT) respectively in a network of 1000 nodes. The proposed method requires four sequential analysis of outlier detection schemes at different layers of MANET protocol stack because single scheme per layer is not efficient in identifying outliers in proposed network. The proposed key management method is useful for MANETs in group authentication and implementation of lightweight cryptographic primitives with secure key. Further, outlier detection mechanism can be extended for identifying various active and passive attacks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Recent Technology and Engineering (IJRTE)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.