Skip to main content
Log in

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper group key management schemes can be used to encrypt and decrypt the payload. This management is serious task in flexible network like MANET due to dynamic node movement and limited available resources. In order to get away from repeated group key refreshment for entire large network, rekeying done only for sub networks known as clusters. To cope up in this situation, the integrated approach of fuzzy trust based clustering (FTBC) and hierarchical distributed group key management is proposed in this paper. The FTBC isolate misbehaving node from legitimate data transmission and also categorize trusted and distrusted nodes by applying fuzzy logic rules. As well as there is no single solution adopted for all kind of applications, hence two more clustering schemes are proposed namely simple clustering and enhanced distributed weighted clustering are incorporated with key management to satisfy different needs. The performance of our proposal measured by introducing attackers and simulation results prove the proficiency of proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.

    Article  Google Scholar 

  2. Bentaleb, A., Boubetra, A., & Harous, S. (2013). Survey of clustering schemes in mobile ad hoc networks. Communications and Network, Scientific Research, 5, 8–14.

    Article  Google Scholar 

  3. Chen, G., Nocetti, F., Gonzalez J., & Stojmenovic, I. (2002). Connectivity based k-hop clustering in wireless networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2450–2459. doi:10.1109/HICSS.2002.994183.

  4. Er, I., & Seah, W. (2004). Mobility-based d-hop clustering algorithm for mobile ad hoc networks. IEEE Wireless Communications and Networking Conference, 4, 2359–2364.

    Google Scholar 

  5. Choi W., & Woo, M. (2006). A distributed Weighted Clustering Algorithm for Mobile Ad hoc Network. In Proceedings of International Conference on Telecommunications (AICT-ICIW), p 73.

  6. Chauhan, N., Awasthi, L. K., Chand, N., Katiyar, V., & Chugh, A. (2011). A distributed weighted cluster based routing protocol for MANETs. Wireless Sensor Network, 3, 54–60.

    Article  Google Scholar 

  7. Amis A. D., Prakash, R., Vuong, T. H. P, Huynh, D. T. (2000). Max–Min D-cluster formation in wireless ad hoc networks. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), Vol. 1, pp. 32–41.

  8. Manoj, V., et al. (2012). A novel security framework using trust and fuzzy logic in MANET. International Journal of Distributed and Parallel Systems, 3(12), 285–299.

    Article  Google Scholar 

  9. Gandhi, J. R., & Jhaveri, R. H. (2015). Packet forwarding misbehaviour isolation using fuzzy trust based secure routing in MANET. International Journal of Computer Applications, 122(3), 30–35.

    Article  Google Scholar 

  10. Geetha, K., & Thangaraj, P. (2015). An enhanced associativity based routing with fuzzy based trust to mitigate network attacks. International Journal of Computer, Electrical Automation, Control and Information Engineering, 9(8), 1855–1863.

    Google Scholar 

  11. Anita, X., Bhagyaveni, M. A., & Manickam, J. M. L. (2014). Fuzzy-based trust prediction model for routing in WSNs. The Scientific World Journal, 2014, 1–11.

    Article  Google Scholar 

  12. Mapoka, T. T. (2013). Group key management protocols for secure mobile multicast communication: A comprehensive survey. International Journal of Computer Applications, 84(12), 28–38.

    Article  Google Scholar 

  13. Rafaeli, S., & Hutchison. D. (2002) Hydra-decentralized group key management. IEEE sponsored Conference, In Proceedings of WCT ICE, pp. 62–69.

  14. Raghavendran, V., Naga Satish, G., & Suresh Varma, P. (2013). A study on contributory group key agreements for mobile ad hoc networks. International Journal of Computer Network and Information Security, 4, 48–56.

    Article  Google Scholar 

  15. Li, W. T., Ling, C.-H., & Hwang, M.-S. (2014). Group rekeying in wireless sensor networks: A survey. International Journal of Network Security, 16(6), 401–410.

    Google Scholar 

  16. El-Bashary, M., Abdelhafez, A., & Anis, W. (2015). A comparative study of group key management in MANET. International Journal of Engineering research and Applications, 5(8), 85–94.

    Google Scholar 

  17. Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 1, 1–22. doi:10.1186/1687-1499-2014-161.

    Google Scholar 

  18. Drira, K., Seba, H., & Kheddouci, H. (2010). ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications, 33, 1094–1107.

    Article  Google Scholar 

  19. Gomathi, K., & Parvathavarthini, B. (2015). An enhanced distributed weighted clustering routing protocol for key management. Indian Journal of Science and Technology, 8(4), 342–348.

    Article  Google Scholar 

  20. Gomathi, K., & Parvathavarthini, B. (2014). An enhanced distributed weighted clustering algorithm for intra and inter cluster routing in MANET. International Journal of Innovative Research in Compute and Communication Engineering, 2(12), 7566–7572. doi:10.15680/ijircce.2014.0212072.

    Google Scholar 

  21. K. Gomathi, B. Parvathavarthini (2015) A secure clustering in MANET through direct trust evaluation technique. ICCC15, IEEE Explore, PNU, Riyadh Saudi Arabia, pp. 1–6.

  22. Ayman, E. L.-S. A. Y. E. D. (2014). A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA, 5(4), 208–219.

    Google Scholar 

  23. Network Simulator NS2 available online: http://www.isi.edu/nsnam/ns.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Gomathi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gomathi, K., Parvathavarthini, B. & Saravanakumar, C. An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management. Wireless Pers Commun 94, 2149–2162 (2017). https://doi.org/10.1007/s11277-016-3366-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3366-x

Keywords

Navigation